Question Totally Anonymous Phone?

Blammo

Don't buy from me
Resident
Language
🇺🇸
Joined
Sep 25, 2024
Messages
252
Reaction score
46
Points
28
Is there a way to make a phone completely anonymous?

It seems using that one Google phone, installing graphene OS, not putting in a sim card, and using tor app is the way to go?

Please help me figure out how to make a phone as anonymous as possible.
 

Speedfac

Don't buy from me
Resident
Language
🇩🇪
Joined
Feb 2, 2024
Messages
35
Reaction score
17
Points
8

Nitrophone its based on GrapheneOS , the camera and the mics and gyro sensor are removed physically also the wifi , its now one of the most secured phones .
 

Blammo

Don't buy from me
Resident
Language
🇺🇸
Joined
Sep 25, 2024
Messages
252
Reaction score
46
Points
28
Could one remove the camera and mics and gyro sensors on a Google pixel? Aka diy lol.

Also, they removed wifi? How does that make things more anonymous? Wouldn't that make you rely on data to use things like signal?

Still checking it out, looking now.
 

mycelium

Don't buy from me
Resident
Language
🇺🇸
Joined
Nov 17, 2024
Messages
429
Solutions
1
Reaction score
160
Points
43
Unfortunately, no, even according to graphene OS page. The phones are too good and too interconnected with the whole thing,(and I'm sorry I am too stupid right now to paraphrase what I read a couple years ago).
When you buy a Google phone, even from mint mobile and pay for it 100% up front and pay 3y5 days of seevice, you still gotta wait 2 months to unlock it and switch to graphene, so that sucks, i just kept an old android for my burner,
 

kafka82

Don't buy from me
Resident
Language
🇬🇧
Joined
Mar 23, 2025
Messages
23
Reaction score
2
Points
3
Why specifically a Pixel 5 and not later versions?
 

mycelium

Don't buy from me
Resident
Language
🇺🇸
Joined
Nov 17, 2024
Messages
429
Solutions
1
Reaction score
160
Points
43
That's the earliest model you can flash graphene on.
And the battery can be removed , but not on later ones
 

dnBQByvHb8Zkawbjpx

Don't buy from me
Resident
Language
🇺🇸
Joined
May 6, 2024
Messages
279
Reaction score
201
Points
43
Most people here seem to be thinking there are state level actors going after them, utilizing zero day exploits and some top tier hacking techniques. Forget about this stuff and focus on the basics that is frequently overlooked and easy to make a mistake over a longer period of time. Following a strict protocol is harder than it may seem.

Use a PIN/password. Never use a thumb print or face id or anything you can't take the fifth on.
Set aggressive locking timeouts, enable device wipe after unsuccessful PIN attempts. No online recovery methods.

Your business phone must be a burner, its purchase must be anonymous and can't be tracked to you. (no online purchases, buy in a pawn shop and pay cash. Do not use large denominations from an ATM, break them first.)
Never ever cross SIM from personal and business devices.
Turn your business phone only when it's required, then turn it off.
Do not turn your business phone at home or where you can be identified.
Do not carry your business and personal phone both turned on at the same time. Location and path patterns over time will tie them together.
Understand IMSI and IMEI. Every phone has an identifier (IMEI). Just getting new SIM is not enough, you can be tracked using IMEI over time and your previous phone numbers can be found and your network of contacts can be identified. Get new burner phone for every new big project (as a physical device) and destroy the old one. Destroy, not sell.
Use multiple physical devices to split networks and keep activities and associates isolated.
Use cellular data for Internet access, never home wifi. Disable wifi if you need to use the phone in range of your home wifi.
Do not use public wifi in places under video surveillance.

These are the baseline rules. If you don't follow them then there's no OS or VPN or anything that can protect you.
 

Omert4

Don't buy from me
Resident
Language
🇷🇺
Joined
Dec 12, 2022
Messages
8
Reaction score
1
Points
3
The problem isn’t just in this part. Let’s suppose you get caught and still have any kind of artifacts on your phone—messages, calls, pictures, or anything else that could help the police investigate your case. They’re going to use Cellebrite to break into the phone for digital forensics.

I’ve seen many cases where law enforcement doesn’t have the balls to exploit zero-days against criminals, but they are investing heavily in other digital forensics techniques, as long as they have physical access to your phone.
 

dnBQByvHb8Zkawbjpx

Don't buy from me
Resident
Language
🇺🇸
Joined
May 6, 2024
Messages
279
Reaction score
201
Points
43
You're right, of course. Don't store anything you don't need and wipe data frequently.

My comment was focused on people who spend hours hardening their smartphone using GrapheneOS and what not, while they ignore basics like IMEI that allows the police to track them and connect all their SIM cards and calls to the user of the not-so-secure phone.
 

Omert4

Don't buy from me
Resident
Language
🇷🇺
Joined
Dec 12, 2022
Messages
8
Reaction score
1
Points
3
At this point, I wouldn’t recommend using the SIM card entirely for dealing with clients or internally, as the SS7 keeps tracking all conversations, calls, SMS, etc. However, I completely agree with the points you mentioned.
 

mycelium

Don't buy from me
Resident
Language
🇺🇸
Joined
Nov 17, 2024
Messages
429
Solutions
1
Reaction score
160
Points
43
You can get a pair of faraday cages that fit the phone for $15 or less.
This will further secure your phone...even if Israel puts their super-sleuth spy shit on your phone, it won't work when in the bag.

You can buy a one year of unrestricted internet(not supposed to slow down or throttle your shit when you download a hundred movies) from calyx institute I believe. 750 for a 5g/4g, 500 for a 4g, and 500 for a sim card, works in any device, paid for a whole year of unlimited, and you can pay with BTC, and you can use xmr to trade for BTC (on cake wallet, etc) so it's still anonymous. They also have a free VPN you can download into phone or laptop.

4NEHovsPyj
 

Omert4

Don't buy from me
Resident
Language
🇷🇺
Joined
Dec 12, 2022
Messages
8
Reaction score
1
Points
3
Personally, I forked GrapheneOS and customized the bootloader using the source code. I also removed unnecessary apps. Then, I created a private communication application for my team. We do not use any third-party applications (such as Signal, Telegram, or other instant messengers); instead, we operate under a zero-trust model when it comes to technology.
 
Top