Mobile + Lapdock, and old machine ids

I would like to begin my privacy measures with a mobile phone and docking station. If I use an old laptop (connected to me) to install GrapheneOS, will that leave a trace on the new phone? The macid of the old laptop is known unto Google and Apple and other bigs.

Why do mobile + lapdock?
I want an all-purpose device with GPS and necessities, to rove. Pixel can be bought with cash in person. Many Linux-preloaded laptops cannot. System76 said the best they could do was to ship to a UPS store instead of home address. What ID gets presented to get that laptop? They only accept credit card or bank transfer.
Long-term advantage: a lapdock could be left behind in a pinch; only the mobile has info,

Extreme Privacy seems to recommended an order of operations.

  1. get linux computer (eg System76)
  2. get mobile phone: Pixel device + GrapheneOS, installed from new computer
    Later chapters cover aliases, payments, relocation.

I feel the need to leave the KYC devices behind. Start with one small machine, and fewer sources of leaks.

Probably (is you are a common person) your threat mobile is a bit exaggerated, and you should not being preocupied with all those things.
Simply buy a Pixel, install a new OS on your computer (or buy a new one from a official store, cash, credit card, o whatever) and put on it Graphene OS.
If you are a normal person CIA isn’t going to look at your computer to see if you have installed graphene os, not sure why do you want to get that

1 Like

Thanks, Yes, the feeling is exaggerated. But, it’s not so much about government.

If I’m going to all the trouble to change my digital life, why do it if a foreseeable mistake leaks and unmasks everything?

consider these steps.
macid was attached to Apple, Google, social media
new device → OS-loaded by old device.
new device → bought with credit and delivered to address.

technical question: would these steps provide trails back to the detailed profiles built up in the past?
if so, that would be a large leak for marketing, scams, or stalking.
ordinary-people concerns, imo

Most of those things specially the steps you mentioned, should be worrying you only if you are actively targeted. If not, then the privacy problems you described are very improbable to be used against you, but the security you gain from installing Graphene os is so much. And the privacy and security would, in this case, reside on the device (like encryption, password, using secure mail, secure communications, etc). So don’t lose your focus and pay more attention to the apps you install, for example. Those things are described by the author in the book because he literally works for people who want/need those things, not because everyone needs those things. You can have Graphene os, but if you full it of non-private and non-secure apps you are not doing that much.
I mean, some level of privacy and security resides in the buying method, like buying from original stores and no secondhand.
Some level (more important) resides on the OS, Graphene in this case
Some level (even more important) in the apps you use and the way you use them.

2 Likes

:+1: thanks.

yes, I plan for a new phone to be a new container, with only carefully curated with FOSS pro-privacy apps. just going through the thought process, to make sure that container is not contaminated from the start