Google voice isn’t available outside the usa, AFAIK. Besides, I would not want google to have access to even more than they already have access to…
Well they need two phones to hide what they do on one of the phones, Lord only knows what that actually is. Not a line of questioning I was interested in hearing about be it cheating or gambling or whatever. One was because they had strict Muslim parents and wanted a clean phone for them to search and a phone to talk to his secret girlfriend and his friends on.
Now, that is a good example that allows me to imagine a bit more about the reason why people would need two phones in some cultures.
Google Voice FTW
It may be better now, but Google Voice wasn’t always the most reliable service in the past.
Phone snooping seems like a social variable many people (and device designers and engineers in particular) would do well to take into account, considering the variety of cultures that use these things around the world.
I remember reading a “Android users give their opinion on the new iOS features” article, or somesuch, and the iPhone-using author was surprised to learn that someone absolutely hated a new feature that allowed quick access to the contacts most often used. The author had only considered it as a bit of convenience for the user, but the interviewee though it was too private a thing to automatically show to anyone who got their hands on their phone.
Good remark, but I think that phone designers actually want users to share as much as they can to their contacts. Their business model is about the users leaking as much info as possible about themselves and whom else are they more inclined to give personal info than to their friends and family? That is probably the reason they are blind to users who want to keep some info private.
Somebody posted earlier about Japan. If the “phone check” is also done in Japan, maybe that explains why people have two?
That would be very rude here.
the aesthetic as well as the functional aspect is important so one of them is supposed to be very sleek and small and minimal for work and the other one is a regular smartphone like most people have in the US.
Separate billing or more likely the second phone outright belongs to the company who gets a fleet of them from the carrier.
I don’t know how common this is, but most of the people that I know who have two phones just kept their old one when they got a new one. The old one may not have cell service anymore, but still can use wifi. So they mostly use one for games or such, and the other for communication. Because phones tend to have their internal space filled up by just a few bloated apps and many apps insist on being on built-in memory instead of an SD card, one phone isn’t enough (despite the fact that they have way more memory than computers a decade ago and that SD slot).
I can understand having two phones due to the fact that they are so leaky with private info. Sadly it would legitimately make sense to have one for family, one for work, one for friends, and one for new contacts. They’re really not well-designed when it comes to things like that.
This sort of thing is an area of OS design which I dislike. Years ago I used to dream of the possibilities of fast, low-power, ubiquitous wearable Linux computers. And now that they are here, they are deliberately insecure and omit all of the good stuff.
Many of these problems of app access would be solved by simply creating another user account. Or being able to easily change permissions. Since Android is based upon GNU/Linux, and iOS upon BSD/Mach this should be the easiest thing. And it’s why I was tentatively optimistic that Ubuntu for phones might have been an improvement. This is not functionality they need to pay developers to include, it is functionality they were paid to remove.
I usually handle this problem by not using deliberately compromised social media services from deliberately compromised phones. But as the years go by, more people expect to be able to chat/text with me, so I will need to figure out something.
As for giving phone numbers in potentially sketchy situations, I use Gurgle Voice. If you use Android, Gurgle already knows your phone number anyway.
Yes, but it’s not widely discussed. Mostly it’s because people want a reliable persistent number that they can, for whatever reason, give to people whom they don’t trust enough to give their primary cell phone number to. There are other reasons, but that seems the most common. Disclaimer, my opinion is based on anecdotal experience and not comprehensive study.
After an … incident where someone who shouldn’t have had my personal number gave my personal number to someone who really really REALLY shouldn’t have had it, I did the same thing. Then work was like “OMG why do you not have a work cell phone? Let’s get you one.” I had to change my personal number for unrelated reasons which ended up saving me epic amounts of trouble later (the second person in the chain started harassing everyone who they’d gotten the cell phone number for). Now anyone who gets my personal number gets a lecture that ends with “If I wanted them to have my number they wouldn’t be asking you.”
Everyone I’ve given the lecture to seems to be pretty understanding about the whole deal.
Were it me being asked to BYOD, I’d just go get me a $10 phone and hand it to them for MDM installation. I’d also expense my call plan.
Maybe 20+ years working in security has warped my perspective.
Eh, maybe but I think that’s sensible. MDM to keep company data safe, separate phone to keep personal data personal. The companies have a legitimate reason for MDM and employees have a legitimate reason to keep their own data use and activity where their employers can’t get at it.
Complaints about carrying two devices … also sensible but I think should be lower priority than personal security and privacy concerns.
On the topic of having two personal phones, I don’t currently have a need for two. I wish we were at a better place with separate user profiles on mobile devices. I think that would alleviate some of the need (not for MDM and separate devices for work and personal) but it would still likely put people out of contact for one profile whenever they were using the other one.
Many of these problems of app access would be solved by simply creating another user account. Or being able to easily change permissions. Since Android is based upon GNU/Linux, and iOS upon BSD/Mach this should be the easiest thing. And it’s why I was tentatively optimistic that Ubuntu for phones might have been an improvement. This is not functionality they need to pay developers to include, it is functionality they were paid to remove.[/quote]
That is an enlightening observation: the phone OS manufacturers paid their developpers to remove that functionality. Therefore part of their business plan is that they can link one phone to one user.
[quote=“popobawa4u, post:47, topic:100680, full:true”]I usually handle this problem by not using deliberately compromised social media services from deliberately compromised phones. But as the years go by, more people expect to be able to chat/text with me, so I will need to figure out something.
What can you do when all people you need to communicate with insist that you use a network which is, by design, insecure?
Therefore part of their business plan is that they can link one phone to one user.
In some countries, the mobile phone carriers are legally required to know who their customer is to establish a contract. Here in Japan for instance, you can not buy a burner phone any more.
in any case @popobawa4u’s thought that “this should be the easiest thing” may not be technically correct as long as one values any sandboxing features or application store features which tie applications to accounts.
Work/personal phones, is my guess.
I’ve been thinking about getting a Fairphone2, so I can combine the sims on a single device.
in any case @popobawa4u’s thought that “this should be the easiest thing” may not be technically correct as long as one values any sandboxing features or application store features which tie applications to accounts.
I never said that I thought it was easy. What I said is that that problem had long ago been solved, as can be readily observed in other POSIX systems. Securely creating and administrating multiple accounts with their respective program access is what UNIX and its derivatives was made for. But the cynical market drive towards “appliances” deliberately places the vendor in the role of administrator, rather than trusting the buyer to make or delegate those decisions. For better or worse, it seems apparent that those corporations profit from devices and code sharing more information than can be considered secure for the users.
For example, when installing an application in MacOS, I can choose whether to install it for the current user, or all users. Because the file system and OS can handle permissions, and recognize distinct user-spaces.
Point being to not accept excuses that it would add undue cost or complexity to include functionality in a Linux or BSD phone which is universal elsewhere. GUIs of the past 20 years or so have readily demonstrated that power-user functionality can be easily hidden away from those users who find it confusing or undesirable.
Having these devices be insecure for users, and having that insecurity exploited by a corporate minority is ultimately a choice.
Unix was not designed to be secure. The whole SU/not SU design is bad and should be shot into space.
I never said that I thought it was easy.
I used your exact words with no intention of selective quotation.
What I said is that that problem had long ago been solved, as can be readily observed in other POSIX systems.
POSIX systems were hardly the first multi user operating systems nor the only ones. However there is nothing about POSIX that requires multiple interactive users and there have been plenty of POSIX system designs for only one interactive account.
Securely creating and administrating multiple accounts with their respective program access is what UNIX and its derivatives was made for.
Actually no, not as you phrased that. If you look into the history of UNIX and its derivatives, security was, as always, an afterthought. This is not to say there have not been derivatives designed specifically for secure operations under specific conditions but that as stated security was not the original intent.
Point being to not accept excuses that it would add undue cost or complexity to include functionality in a Linux or BSD phone which is universal elsewhere.
But again, going back many years, there have been Unix and variant based appliances with only a single interactive user. This isnt new. For exmple, I dont know if you remember SCO Unix (at one time known as Xenix, but it was very popular for point of sale based systems. The single interactive user was a cash register terminal
GUIs of the past 20 years or so have readily demonstrated that power-user functionality can be easily hidden away from those users who find it confusing or undesirable.
There is nothing inherent to a GUI as you describe. Obviously one can in Mac OS do things which at the CLI require sudo permissions. Same for just about all other GUI variants these days.
When you get down to it being able to turn a network interface on or off in iOS or Android is in fact an administrative action…
Having these devices be insecure for users, and having that insecurity exploited by a corporate minority is ultimately a choice.
insecure for users? What?
I get that you are using “exploited by a corporate minority” in some political sense, but again, kinda What?
I used your exact words with no intention of selective quotation.
Meaning that it is easy now only because that work has already long since been done and become ubiquitous. Not that it was trivial to conceive of or implement in the first place.
Actually no, not as you phrased that. If you look into the history of UNIX and its derivatives, security was, as always, an afterthought. This is not to say there have not been derivatives designed specifically for secure operations under specific conditions but that as stated security was not the original intent.
I don’t mean security in the contemporary hardened install sense. Even in just the basic administration sense of “set it up so that various users have unambiguous access to resources”. That’s a low bar, but arguably phones don’t meet it, because they aim to be deceptive about who actually controls the device.
Not that it was trivial to conceive of or implement in the first place.
Time sharing and systems like Multix existed before Unix, so yes the work has already been done but you persist in an ahistorical understanding.
Even in just the basic administration sense of “set it up so that various users have unambiguous access to resources”.
That bolded words there, I dont want to be rude, but when you can address each of these in reasonable detail, please revisit that point.
That’s a low bar, but arguably phones don’t meet it, because they aim to be deceptive about who actually controls the device.
Technical inaccuracy followed by nonsequiter of ideology. A base install of Android or iOS these days actually does a very good job of separating permissions of non-interactive accounts vs what is essentially the user account and sandboxing.
There is nothing inherent to a GUI as you describe. Obviously one can in Mac OS do things which at the CLI require sudo permissions. Same for just about all other GUI variants these days.
So, how do you access the CLI and use sudo to administrate your phones? Rooting them typically voids the warranty, and even then these systems are missing the utilities to create and manage users and groups, and set program permissions.
Technical inaccuracy followed by nonsequiter of ideology. A base install of Android or iOS these days actually does a very good job of separating permissions of non-interactive accounts vs what is essentially the user account and sandboxing.
It is hardly an ideological problem that if one is not the admin, one isn’t in control of their system. If it’s secured by somebody else, including against me as the user and nominal admin, then the technicalities of how they have secured it are more relevant to them than they are to me. Sandboxing is more secure than not, but it is undermined by allowing the apps to leak user data for use by others. The technical problem is how to have finer control of one’s system, rather than trusting all-or-nothing permissions set by the apps themselves.
It seems you wont or cant reply to any of the technical or theoretical issues and persist with ideological matters so I’m done. I dont wish to try and change your ideology, thats relatively pointless.
What do you mean “reply to the issues”? You keep making statements which are tangential to a brief, simple point I made. You have not asked me any specific questions, and you have not answered any of mine. Thanks for “schooling” me with wikipedia links.
Yes, basic administration is not in itself a “security model”, but if you are prevented from administrating your system, you won’t be able to secure it anyway. That is the whole, very simple point. It is not meant to be a detailed history of operating systems or security models.
How is controlling one’s Android system an ideological rather than technical problem? Perhaps some ways in which trust models are defined have a component of ideology. But once that has been decided, how does one implement and enforce them on their phone, technically? Do computer security professionals explain to their customers that “Since you accept that there are back doors into your system, your push to have them patched is your own ideological problem”? I can imagine that would go over really well.
A base install of Android or iOS these days actually does a very good job of separating permissions
I’ll have to try one of the newer ones someday. The first (and only) tablet I got had nothing like that. Once you logged in, the only way to log out or switch users was to do a full device reset (which of course would remove all apps and data). It was a dealbreaker problem - kind of made it useless as a household device that could be left on the living room table for anyone to pick up and use. At least Chromebooks have user accounts.