Anonymous ID: 24d26a Feb. 23, 2025, 12:02 p.m. No.22641651   🗄️.is 🔗kun   >>1673 >>1692

>>22641606

Security by obscurity, my friend… using phones advanced technology. Of course you’re going have challenges…. using trusted devices that have been verified as well as using technologies that have been verified by you yourself. You can very easily subvert all this shit…. Knowing how to elegantly move through the Internet. It’s part of the steps you need to learn.. you can always work around the issues but you have to be extremely smart and know what you’re doing and it’s a pain in the ass from experience. So if you’re using technology, that is advanced and completely compromised, of course you’re going to be under surveillance. Why do you think they only have two types of phones? Why do you think there’s only a few types of operating systems that the general public uses. All compromised. You have to build it yourself if you want to be clean on the Internet. Even then most of everything you touch i your system on the Internet has to be disposable. Meaning it’s deleted after every session and rebuilt fresh every time you touch the Internet. Are you starting to get it? Everything is under surveillance for the average person. But those who know the dance steps know how to dance