
DispVMs may not be sensible for chat apps anyway as you’ll find you’re signed out and have to log in as a new device each time, which makes intrusion harder to detect. Wickrme is working well in a standalone appVM, have had no successes with installing it in templates and executing in appVMs or dispVMs.
#Wickr me wifi compromised for android#
I want my ‘cell phone’ to be trashable in the event of zero day attacks and stalkerware.Īm wondering if android emulators ‘phone home’ and allow some sort of big tech tracking? Is there a solution I should look at which abandons the android part all together? I’ve had a search for android emulator threads in here, but not so much about specific use cases or privacy concerns Google or Skype numbers seem like a place to start, and can have anonymous signup workarounds.Ībsolute anonymity isn’t a desperate problem for me, so much as mitigation of SS7 geolocation, exploits, and other baseband modem attacks are. Please offer your insights into approaches for how you might get whatsapp or signal working in qubes without using a mobile phone at any point.

Possibly also has a use-case for 2fa with a voip number (such as with banking) that isn’t associated with an actual cell phone and simcard, though that might be more easily achieved in a desktop appvm with web interface that accepts sms forwarding, or if it suits your model, from a USB sim dongle opened in disposable.

I’d prefer to not use a smartphone due to all the tracking that goes on.Īm looking to run android emulator VMs to facilitate certain apps which don’t have desktop interfaces, or that do have desktop interfaces but first require signup with a mobile number/device, or that require a mobile device for periodic re-authentication of account. Topic centered around my own threat model: people can know who I am (when I choose), just not where I am. Seeking to get the most out of messaging services whilst sacrificing the least.
