I know it’s an odd question, but where I live phones get stolen often. My phone doesn’t have the option for an eSim, which is a problem because 90% of the time when a thief steals a phone they take out the SIM card immediately, meaning I wouldn’t be able to remotely lock or wipe my phone.

Should I consider glueing the SIM tray shut? Or are there alternative less permanent measures I can take to keep my device secure?

    • darkstar@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      2
      ·
      1 year ago

      Uhm, I don’t care about the device or the SIM card?.. I care about my data, and I care about remotely wiping the device before they can try access the device if they are even trying to access it in the first place?

      Sure they can turn it off, but if I activate the command to wipe the device the command will execute as soon as the device is powered on.

      This is not the case if they remove the SIM. If they remove the SIM the connect is lost and the device can remain on and be tampered with, with my data still entact.

      I don’t “keep asking for proof” I literally asked in one comment? You seem very angry about people asking questions online, maybe you should do some introspection or something idk

    • socsa@lemmy.ml
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      1 year ago

      This is unfortunately how a lot of online privacy communities feel. Like it’s mostly performative privacy fan service. Often with a weird martyrdom thread running through it, almost as if people are mixing up the ideas of privacy, with simple rebellion against modern technology.

      • Facebones@reddthat.com
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I can’t speak to any particular communities, but to me it’s about putting extra steps between me/my data/whatever and thieves. (I have a personal tinge of rebellion against social media and perma connectedness but I generally see them as separate)

        If my password is “password” anyone can and will pop it

        If my password is “P@$sw0Rd60&4” alot of people could and probably would

        If my password is ^ and I use 2FA, sure that can be spoofed but the number of able hackers is much lower and it’s much more work, quite frankly I’m just not that interesting 😂

        Etc etc, adjusted for situation