Is there a Backdoor on our Phones? An Analysis of the Supply Chain

Enjoyed this video? Join my Locals community for exclusive content at robbraxman.locals.com!
1 year ago
1.4K

The supply chain for phones is fraught with risk. However the typical person has no understanding of where the threats might come from. It is easy to attribute backdoor activity to certain countries for example.

Where is the real threat and is it really a significant one? A viewer commented that he trusts Apple's supply chain over any other.

Let's investigate if these threats should concern us and which products and companies could be more trustworthy when it comes to the supply chain processes for phones.

-----------------------------------
BraX2 Privacy Phone is now available on https://brax.me. Sign in to the platform to see the store.
-----------------------------------
Merch Store
https://my-store-c37a50.creator-spring.com/
-----------------------------------

I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Support this channel on Patreon! https://www.patreon.com/user?u=17858353

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

https://brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise

https://bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing

https://whatthezuck.net Cybersecurity Reference

https://brax.me Privacy Focused Social Media - Open Source

Please follow me on
Odysee
https://odysee.com/$/invite/@RobBraxmanTech:6
Rumble
https://rumble.com/c/robbraxman

Loading 10 comments...