Is it possible to have an ISP that doesn't know the approximate location

Basically having any sort of internet connection, where the router can’t be located.

Through for example transmission towers triangulation.

With approximate I mean making it impossible to make a profile with this information. Goes to work there, eats there etc

And I’m not talking about data that goes through the router, just the location of the router itself.

I’m also not talking about being traceable.

In the US you can have a Mint sim paid for with crypto and delivered to a private mailbox or to a Amazon locker, or bought with cash in a store.

Use a VPN in your phone and they’ll have the location of a SIM,

Need to be in the US for acquisition and activation, but you can pay extra for international roaming.

Only thing I can think of.

The mint sim can still be located, even if it can’t be traced back to anyone.

Can’t you use less Bandwith than 2.4G to allow for less accurate tracking?

I don’t really know. All I know is 2G has serious security issues.

This video beautifully explains some of it:

GrapheneOS has even added a toggle to allow for disabling it

3 Likes

Internet where the location of the router can’t be located by the ISP? Pretty hard if not impossible.

  • Any mobile based system can use tower trilateration to locate you.
  • Any hardwired (cable, fiber) connection has your address.
  • Any satellite will have a GPS in its equipment or be one that has to be installed by a technician on site.

If there are any dial up ISPs anymore that might work because that potentially decouples the ISP from the line provider. I guess you’d have to get a copper loop installed and I don’t think that is possible anymore. At least in the US. And if you lived through the dial up era you know dial up speeds were in kilobits/second, low kilobits/second with huge latency. A 1 megabit/sec DSL line is really high speed compared to that.

Using open WiFi at cafes, etc. (along with a VPN) is about the only way I can think of where your ISP doesn’t know where you are but that is only because you don’t have an ISP. Using open WiFi networks has its own issues so it would be hard to seriously recommend that as a regular practice.

A plan like Mint mentioned by others is half way there in that Mint knows where your device is but not who you are.

If you are worried about your ISP knowing your location then your threat level is likely such that you should also worry about who you keep company with. Anyone else you spend time with likely has a phone that can be tracked.

3 Likes

Aren’t dial up only for PSTN (Public switched telephone network), which at that point it wouldn’t matter anymore that you can’t be located, because all the information transmitted can be heard up on.

It just seems to me that if you have history of being a whistleblower or around that threat model, and you do one slip up and don’t use the tor net connection, you can be located and assigned to the information you provided.

I guess best you can do is getting a prepaid Sims then

2 Likes

My assumption was that your PSTN provider would be different from your ISP which would slightly decouple the location from the ISP. Given how the PSTN works, that decoupling could be figured out pretty quickly by anyone capable of getting a court order or warrant.

With respect to “can be heard”, with the right technology any link be it cellular, cable, fiber, satellite can be “heard”. You will want encryption on the link regardless.

I am wondering about the OP’s threat model. I guess a whistle blower as others with apparently as high a threat model would have an organization with technical people able to help on this and thus no need to ask questions to strangers on a random website.

It that is the case, probably burner phones with prepaid SIMs would be the best bet. However operational security would be pretty important. Just the fact that a whistle blower has specific information from within an organization probably places them on a very short list of possible suspects.

I hope I understand this right. My threat model is how careful I am myself, be it privacy or security.

In that case, threat model, at least for privacy, was quite non-existent a few days ago. In the couple past days, I just wanted to learn more about it, and will try to take some measures myself in the future. Like routing all traffic through tor and using Qubes.

Something interesting I learned, was that the darknet is not just a place for trafficking, but can also be a place, where one could communicate with others without anonymously. I would like to know more about that, but I don’t think I should really go there and that there’s much information provided on the open anyway.

Yeah, x) you’re probably right. I can’t imagine how someone can get through all of that alone.

I still believe that technology that allow an internet connection could be more anonymized, but is just not wanted.
I could imagine that secret agencies have other solutions to this.

Prob try using wifi hotspot ONLY? Cell network provider always have your approximate location to provide service. Just like your broadband isp always know where their customer use their service.

There other risks and inconvience you have to mitigate/ adapt though.

Requires some serious creativity.

Mint mobile sim card, phone in USB tether mode, connected to travel router, VPN server mode, solar panels.

Connect to the VPN and route your traffic through a phone in a tree somewhere in a forest.

Doesn’t seem to be any better than just connecting to tor

Cellular networking is definitely not the way to go. In fact, anything that would require you to have IPv4 address would be susceptible. What you’re talking about would require autonomous mesh networking. ISP’s are a central point of control, so they can monitor packet transmission to and from your router. So I don’t think it would be possible to have both a ISP and a “un-locateable” router. You might be interested in giving this a look.

The solution these people use to transmit information to their operatives are one-way things like radio or pagers, etc.

Once you add transmission into the mix — like would be required for internet — someone will be able to trace the transmitter’s location.

Reticulum seems really interesting. But on what would be most suitable to build reticulum upon for anonymity instead of wifi?

RNodes are obviously the most ideal scenario. But if you read the docs one of the best things about Reticulum is how versatile it is. It can work over existing IP networks as well.

isnt sending encrypted data over radio like rnode illegal and cant the transmitter get easily located?