Recently, I have disclosed a security issue in iOS 18.7.2 where attackers
could bypass the 'Load remote images' security settings, which means that
anyone can send you an email with images that are remotely loaded.
Relevant Apple's security update: https://support.apple.com/en-us/125633.
Junk mails is much more than it appears to be.
For example, did you know that if you read a particular mail and it just happens
that it has an embedded image in it, you're already giving away a critical piec
e of information about yourself? You see, the sender of that email now knows t
hat you read it, it also knows when and how, and by the how I mean it has inform
ation about your e-mail client and maybe your IP address.
With that information retrieved, the sender will personalize and send another em
ail, every time you open it he will know more about you. The same process will
repeat itself over and over and it will only get more and more damaging to you a
s your personal life is being teared apart.
The most dangerous thing about spam is that it is a constant threat that we cann
ot help but get used to, we have to forget about it, we are taught not to fight
it, almost as if it were the soundtrack of society playing over and over in your
ears. Well, unfortunately for us, we might have gotten used to the looping song
by now but those junk mail artists did not and they will keep using
it as a medium, a medium that does not requires any of our consent to keep
gaining more knowledge about us.
We are being preyed upon. Today and all the days to come know that you are ever
y mail spammer's Trueman Burbank.
My recommendation:
- Create several emails (not just one) and record every time you discloses
it, to whom, how, when. This way you get actual leverage against whoever leaked
it. - Not using iOS, any non generic android ROMs (you name it), instead, first get
yourself a device that's good for low-level hacking and install
the nearest thing you can get to a generic operating system.
Take back what is yours, technology.
Here are some resources to get you started:
- https://postmarketos.org/state/
- https://kupfer.gitlab.io/
- https://github.com/zenfyrdev/bootloader-unlock-wall-of-shame
- https://wiki.postmarketos.org/wiki/Devices
- https://github.com/nikhiljha/awesome-linux-mobile
- https://plasma-mobile.org/
- https://opengapps.org/
- https://www.kali.org/docs/nethunter/
- https://linuxphoneapps.org/
- https://e.foundation/
- https://waydro.id/
- https://sailfishos.wiki/
- https://github.com/microg
- https://lineageos.org
- https://gitee.com/openharmony
- https://www.yoctoproject.org
- https://infolib.re/Ordiphone
- https://blog.denv.it/posts/pmos-k3s-cluster/
- https://source.android.com/docs/core/architecture
- https://source.android.com/docs/core/architecture/dto/partitions
- https://connolly.tech/posts/2021_05_06-android-bootloaders/
- https://knazarov.com/posts/daily_driving_oneplus6_postmarketos/
- https://github.com/bkerler/edl
- https://connolly.tech/posts/2021_05_06-android-bootloaders/
- https://github.com/bkerler/mtkclient
- https://github.com/log1cs/Unlock845
- https://docs.postmarketos.org/pmaports/main/device-categorization.html
- https://wiki.postmarketos.org/wiki/Potential_apps
- https://github.com/blissd/fotema
- https://odysee.com/@linmob:3
- https://wiki.postmarketos.org/wiki/Backup_and_restore_your_data
- https://wiki.postmarketos.org/wiki/Android_Recovery
- https://forums.gentoo.org/viewtopic-t-1096394-start-0.html