TL;DW

LINDDUN card deck PDF for reference: https://downloads.linddun.org/linddun-go/default/v240118/go.pdf

You are viewing a single thread.
View all comments
17 points

Rotary.

permalink
report
reply
1 point

Not really. A smartphone with a privacy-respecting OS and E2EE communication apps only is more secure. Though you can argue that it’s not really a phone if you don’t use the soter service.

permalink
report
parent
reply
14 points

Tin cans and string

permalink
report
parent
reply
7 points

The tin can phone inherently provides end-to-end encryption. The acoustic signals, which are essentially longitudinal mechanical vibrations, travel directly through a taut string or wire. This physical medium ensures that the sound waves are converted into mechanical vibrations at the transmitting end and reconverted into sound at the receiving end, effectively eliminating any possibility of electronic eavesdropping or interception.

One of the most significant advantages of the tin can phone is its complete absence of a digital footprint. Unlike modern telecommunication devices that rely on electronic signals and data packets, tin can phone operates purely on mechanical principles. This means there are no digital records, metadata, or logs that can be hacked, traced, or subpoenaed.

The simplicity of the tin can phone renders it immune to a wide array of cyber threats. There are no software vulnerabilities, no firmware to update, and no risk of malware or ransomware attacks. The device’s operation is entirely analog, relying on the physical properties of sound waves and mechanical vibrations, making it impervious to digital exploits.

The physical nature of the tin can phone also contributes to its security. The string must be kept taut for effective communication, and any attempt to tap into the line would be immediately noticeable due to the loss of tension and degradation of sound quality. This provides a built-in tamper-evident feature, ensuring that any unauthorized access attempts are easily detected. On top of that, if someone attempts a man in the middle attack, you should be able to see it happening during the call and act accordingly before any sensitive data gets exposed.

The operational simplicity of the string and cans phone is another layer of security. With no complex interfaces or user authentication mechanisms, the risk of user error leading to security breaches is virtually nonexistent.

permalink
report
parent
reply
4 points

How? Literally uses the same phone lines that have always been not secure or private

permalink
report
parent
reply
1 point

No google, samsung, or apple services in the background or separate carrier operating system. Plus the audio is always worse on the old phones. Unless law enforcement is out to get ya, the only thing being tracked is what time and number called you, or whom you called and at what time.

permalink
report
parent
reply
1 point

Unless law enforcement is out to get ya

Seems like a huge oversight in privacy communities, which are frequented by people with state actor level threat models.

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 4.8K

    Monthly active users

  • 2.9K

    Posts

  • 79K

    Comments