I see. I’ll look into that. Thank you. It’s my first day here. Nice to meet you. I’m signing out cuz I’m turning into a pumpkin while I type. Good night everyone
Yes, but Bluetooth is just 2.4 GHz. If you look at the test results I linked above a lot of the products performed worse at higher frequencies like 5-6GHz, sometimes dramatically so.
If you test with Bluetooth it will tell you whether it can block Bluetooth, 2.4GHz Wi-Fi, GPS, some cellular signals, etc… but it might not tell you whether it effectively blocks 5 GHz Wi-Fi, mmWave 5G, other cellular signals, etc.
If you have an AirTag and an iPhone, putting one in the bag and seeing whether it can be detected might be a better DIY test than just Bluetooth, because it will cover Ultra Wideband at 6.5-8GHz in addition to Bluetooth at 2.4 GHz.
A less useful test is to simply put a phone in a container and see if it rings when called. But this has a serious limitation: you likely don’t know how far away the cell tower is, what frequency it’s using, or its signal strength. So even if a container passes this test in one location, there’s no guarantee the shielding will prove adequate somewhere else.
Anyways, based on that post I would be much more inclined to trust the Mission Darkness Window Pouch he tested than any DIY solution.
In addition to foil you might need something to ground the signal with - you will probably get better signal blocking capability if your makeshift foil is connected with a wire to an outlet’s ground… but this does not make it mobility friendly.
Keep in mind your threat model — what are you trying to defend against? If it’s customers/randoms on the Internet, hide your face and any personally identifiable details in your shots (for example, family pictures in the background, names written somewhere, street names visible from your window, etc.) Also don’t show your face as facial recognition software can be used to search your identity online by just using an image of your face. The tools recommended here are to assist in avoiding general mass surveillance but they cannot help if you already willingly give the information away (e.g. your government ID and bank information to a platform such as OF).
If you’re trying to keep future employers or even the public from finding out what you worked in, consider that platforms such as OF may sell user data, banks sell user data (they may see a deposit coming from the platform), and either the platform, a payment processor, or some other intermediary with your data maybe breached or purchased in the future and that data could be exposed.
Moral of the story, whatever you decide to do, remember that everything that’s done on the Internet stays there forever and even though we can encrypt data securely today, we do not know what computing/encryption cracking capabilities the future holds.
Edit: I forgot to mention that voice recognition software is another way to potentially identify someone so that’s something else to look out for.
Do you mean Computer Science, or do you mean something else by CS?
But in any case you are on the right track, Graphene OS on a Pixel and Linux on your desktop/laptop are two key components of a good privacy strategy.
Whatever general language you choose, you’ll probably learn some bash scripting once you get into Linux, but you can happily use Linux without it if you choose the right distro.
If you’re not sure what language, to learn, but are interested in computer science, it’s hard to go wrong with Python.