I know it’s an odd question, but where I live phones get stolen often. My phone doesn’t have the option for an eSim, which is a problem because 90% of the time when a thief steals a phone they take out the SIM card immediately, meaning I wouldn’t be able to remotely lock or wipe my phone.

Should I consider glueing the SIM tray shut? Or are there alternative less permanent measures I can take to keep my device secure?

  • Observer1199@lemmy.ml
    link
    fedilink
    arrow-up
    19
    arrow-down
    12
    ·
    9 months ago

    You keep asking people for proof but yet you provide none for your claims.

    You’re focusing (obsessing) about the wrong thing - you made up your mind as to what you think the solution is before you even asked the question and your rejecting the right answers because they don’t confirm to the answer you want to hear.

    If someone steals your phone, it’s gone. “Locking” the sim card slot will not prevent this. Make your peace with that.

    Sim card in or out, phones can be turned off. If the problem is as ubiquitous in your country as you suggest, law enforcement doesn’t even care that if they didn’t turn off the phone it does not matter. If law enforcement does care, they’ll start using other techniques (Faraday bags) as soon as people start getting jail time. Despite your assertion otherwise, not all criminals are dumb and the ones that are, are still smart enough to copy the ones that aren’t.

    You won’t be able to track them, you won’t get justice, the thief’s will make money, the world will continue to rotate just the same. Try addressing the problem elsewhere.

    • darkstar@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      2
      ·
      9 months ago

      Uhm, I don’t care about the device or the SIM card?.. I care about my data, and I care about remotely wiping the device before they can try access the device if they are even trying to access it in the first place?

      Sure they can turn it off, but if I activate the command to wipe the device the command will execute as soon as the device is powered on.

      This is not the case if they remove the SIM. If they remove the SIM the connect is lost and the device can remain on and be tampered with, with my data still entact.

      I don’t “keep asking for proof” I literally asked in one comment? You seem very angry about people asking questions online, maybe you should do some introspection or something idk

      • Observer1199@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        9 months ago

        It’s still possible to prevent you wiping the phone with the sim in. Admittedly that would work most of the time but all that’s needed to change that is a someone watching the right YouTube videos and spreading the word.

        If your phone is encrypted and has the correct security settings then your data isn’t vulnerable. Unless it’s a government agency or something like an APT. If that’s the case there’s little you can do besides not keeping any valuable data on it.

        It’s unlikely they care about your data though. Not unless you’re wealthy enough to be bribed. The main concern for them is getting caught by tracking, depending on how much law enforcement cares.

        What makes you think I’m angry?

    • socsa@lemmy.ml
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      9 months ago

      This is unfortunately how a lot of online privacy communities feel. Like it’s mostly performative privacy fan service. Often with a weird martyrdom thread running through it, almost as if people are mixing up the ideas of privacy, with simple rebellion against modern technology.

      • Facebones@reddthat.com
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        I can’t speak to any particular communities, but to me it’s about putting extra steps between me/my data/whatever and thieves. (I have a personal tinge of rebellion against social media and perma connectedness but I generally see them as separate)

        If my password is “password” anyone can and will pop it

        If my password is “P@$sw0Rd60&4” alot of people could and probably would

        If my password is ^ and I use 2FA, sure that can be spoofed but the number of able hackers is much lower and it’s much more work, quite frankly I’m just not that interesting 😂

        Etc etc, adjusted for situation