- What it REALLY takes to be Anonymous - What it REALLY takes to be Anonymous 😉 #shorts - YouTube
- How to set up an ANONYMOUS iPhone & Apple Computer - How to set up an ANONYMOUS iPhone & Apple Computer (2021) - YouTube
So, these videos combined have some really good advice on buying electronics more safely. Like, setting up a device in store. However, this is where I raise a question over whether both (combined) can ever be pragmatically used:
The short has the situation using Qubes or Tails OS, but then the Anonymous iPhone and Apple Computer does not mention swapping out the OS. And to NEVER use an existing account, only all brand-new.
Basically, log into an existing account. Game over.
The question I have ties to threat modeling. If you are looking to set up an anonymous device for anonymous tasks, would an iPhone or Mac computer ever be a practical solution? I get having them as secure and (decently to potentially satisfactorily) private devices.
Wouldn’t seeking to completely anonymously buy a device be sensible for a device that facilitates anonymity effectively, which I ask how far iPhones and Macs can go here?
And ignoring the more extreme measures like never using an existing account, following everything else (like in-store setup and having a VPN), I think you likely at least bought your device relatively safely. I question the challenge that logging into an existing account while following every other precaution is a huge deal, on a (in-practice) privacy and security-wise.
What threat model is Naomi going with in the Anonymous Mac and iPhone video?