Scenario 1 (MobileHotspot):
GrapheneOSPhone/Airplanemode/Wifionly
With:
Mobile sim router or (normal google) smartphone as hotspot to provide internet. (Sim card is anonymous)
And:
Orbot always on.
Scenario 2 (publicWiFi):
GrapheneOSPhone/airplanemode/Wifionly
with
Wifi Connection to one of thousands of public wifi's, and:
Orbot always on
The public wifi's that I refer to this:
There are a few isp's / company's that provide thousands of hotspot within the area.
Pretty good coverage.
But:
They are not free to just hop in.
Some have a free plan with a time limit of 30 minutes.
So I would have to sign up to use it without limitations.)
I think It would be possable to sign up without Id verification. (if not than this post will be obsolete)
In both scenario's, the grapheneos phone would remain anonymous, if the hotspot device is just in use in the public, in a certain distance to the homezone.
In the homezone, another hotspot device | another isp4openwifi | or even a homewifi Tor/VPN routed accesspoint (with KYC) could be used to cut the connection, that the grapheneosphone in the homezone is the same that the one in the public certain/distance.
The ATVANTAGE of the FIRST OPTION is that the imei on the grapheneos device stay's invisible to the cell network.
The DISATVANTAGE of the FIRST OPTION is that a mobile sim router sticks out of the crowd and a regular phone has too much tracking preloaded. No matter which device act's as a hotspot, the use of orbot will produce tor traffic which again sticks out the crowd.
So in this option you get tracked by defauld or you get flagged as a person that has something to hide.
The ADVANTAGE of the SECOND OPTION is, that the cell network is entirely avoided. Mucho bueno.
The DISADVANTAGE of the SECOND option is that the grapheneos device will stick out the crowd by (maybe) leak the fact that it's not a normal phone and will (definetly) stick out the crowd because of the orbot/tor traffic. Also, the movement of the phone would be easily trackable, because even if there is Mac randomisation, the fact that the public wifi's are entered by a subscription runs the Mac randomization useless. The ISP will always know, that it's the same person.
So what is the better option?
Are there no go's I didn't mention in the second scenario?
Which option has more vulnerability's?
The best option that I could think of is to have WiFi access to all routers everywhere. But that is not possable, for good.
I want the traffic in this way:
The traffic encrypted, the destination invisible.
And the security this way:
The access point to the internet by it self should not be a big danger for the integredy of the grapheneos device.
I don't want to get flagged by network analysis for the use of an privacy phone with tor traffic. (maybe a VPN which then connects to for would be better than direct orbot).
I also don't want to produce a location map where everyone with access can see every step I take. But I think that's just not possible.
In conclusion I want that nobody can see what I talk and who I talk to, and that nobody can see where i walk along physically. And i want all that, by not looking as a weirdo talking to nobody while still talking gibberish and physically gliching from the left to the right. Instead I want to look like everybody else in the park.
(That's all I can say to the upcoming question of what I want to archive and stuff).