Need more details. Is your friend a complete moron when it comes to computers or are you James O'keefe (who is also a complete moron when it comes to computers) looking for ways to kick the FBI out of your dresser drawer?
Are you just talking about phones? Easy answer for that one: Rob Braxman. He will teach you everything there is to know, but to summarize: Get a de-googled phone.
Computers? Desktop? Get Linux. Laptop? Get Linux. New laptop hot out of the New World Order oven that won't allow you to turn secure boot off so you can install Linux? Get an older laptop, then get Linux. If you got money the https://frame.work laptop is worth considering too, with Linux of course.
Oh and by the way, try not to get a Linux that has SystemD.
Anything electronic can be hacked, only anything without a modem/gps module/wifi could be used off net. But if they get your device physically they can hack it as well through the kernel, firmware, or implemented backdoors to see what's on it.
You would have to log the incoming/out coming connections, then trace the ip address back to source. That's if they did it sloppy. Alot of backdoors run on firmware level/kernel level code so unless you have a experienced programmer to diagnose and find it you wouldn't know. If they deleted the logs you wouldn't know at all, and their software is advanced enough to do that as well most likely. Pegasus 2.0 only needs a phone number and they can get into your phone if connected to cellular data. If you want more info on this look up the joe rogan video with the guy who helped trace who hacked Jeff bezos phone, it was the Saudis using an ex mossad Israeli intelligence company that provides it and has been banned already in the U.S. but have still been using it. There is a current lawsuit right now between them and Apple.
Never speak. Never think. Never ever EVER question authority......or buy/build/shoot a scary 80% ghost gun and kill ABC's with trigger switches. I'm only kidding, of course. NEVER CENSOR YOURSELF, THINK CRITICALLY, QUESTION EVERYTHING & KILL AUTORITY WITH 80% HIGH CAPACITY BUMP CLIPS
Need more details. Is your friend a complete moron when it comes to computers or are you James O'keefe (who is also a complete moron when it comes to computers) looking for ways to kick the FBI out of your dresser drawer?
Are you just talking about phones? Easy answer for that one: Rob Braxman. He will teach you everything there is to know, but to summarize: Get a de-googled phone.
Computers? Desktop? Get Linux. Laptop? Get Linux. New laptop hot out of the New World Order oven that won't allow you to turn secure boot off so you can install Linux? Get an older laptop, then get Linux. If you got money the https://frame.work laptop is worth considering too, with Linux of course.
Oh and by the way, try not to get a Linux that has SystemD.
Anything that doesn't connect to the internet. Otherwise it can be hacked.
Pencil and paper.
Typewriter
Only if you burn the ribbon, a lot of those you can read the ribbon, same with the corrector ribbons.
True, but they can’t be hacked. Kremlin switched back to typewriters several years ago when they realized NSA can basically hack anything.
True, I guess I started thinking organic spying, lol.
A sharpened stick.
Pen and paper.
Just be sure there isn't a pad under it that kept the pressure indentations.
Anything electronic can be hacked, only anything without a modem/gps module/wifi could be used off net. But if they get your device physically they can hack it as well through the kernel, firmware, or implemented backdoors to see what's on it.
How do you know if you've been visited?
You would have to log the incoming/out coming connections, then trace the ip address back to source. That's if they did it sloppy. Alot of backdoors run on firmware level/kernel level code so unless you have a experienced programmer to diagnose and find it you wouldn't know. If they deleted the logs you wouldn't know at all, and their software is advanced enough to do that as well most likely. Pegasus 2.0 only needs a phone number and they can get into your phone if connected to cellular data. If you want more info on this look up the joe rogan video with the guy who helped trace who hacked Jeff bezos phone, it was the Saudis using an ex mossad Israeli intelligence company that provides it and has been banned already in the U.S. but have still been using it. There is a current lawsuit right now between them and Apple.
Why did you write "Alot"? Is it really Apain to put Aspace between words?
Never speak. Never think. Never ever EVER question authority......or buy/build/shoot a scary 80% ghost gun and kill ABC's with trigger switches. I'm only kidding, of course. NEVER CENSOR YOURSELF, THINK CRITICALLY, QUESTION EVERYTHING & KILL AUTORITY WITH 80% HIGH CAPACITY BUMP CLIPS