There’s this post from yesterday with the same question: https://slrpnk.net/post/8851683
https://en.wikipedia.org/wiki/Acoustic_coupler
Slap your phone in one of those bad boys and go to town with your TST 3550 or whatever.
As for cell phones, I don’t think it’s really supported. I’d recommend using a separate encrypted calling app, or getting a dedicated encrypted phone device.
Big-ticket items like PS5s and laptops have serial number barcodes on the outside of the box for that reason.
If you really don’t want it tracked for some reason, buy from a third party seller who, while they might record that info, isn’t going to share it with anyone and will probably lose the sticky note it was written on in a few weeks. Or go to a pawn shop and buy one in cash.
But if you’re going to use a PS5, aren’t you going to have to link a payment method for stuff like online services anyway?
Seems sketchy. You give them access to everything instead? How do we know they won’t be an avenue to compromise?
This bit from their FAQ does not inspire confidence either:
Is Guardio Legit?
Guardio is definitely 100% legitimate, and it’s also a great product.
If it was, they wouldn’t need to say stuff like that.
Were the courts not enough control for creditors? Since when are they allowed to lock you out of your purchased property without a court order?
I don’t think courts are typically involved for civil repossession.
But it sounds like this is used when the device isn’t your purchased property, but leased on contract.
I guess it makes sense for them to do this if people started leases, paid the first month to get the phone in their hand, then walked away with the nice new phone they paid like $35 for, to sell or just use off-network.
Actually, that would make it easier to fall for a phishing page. My browser extension will only offer to fill example.com. If I’m on exarnple.com, it won’t. This makes me say “hmm, why no match for this page? ah! the domain is different”. With a notebook, I’d happily type the password in just the same.
It’s probably not that interesting.
You might be able to request deletion and still get the data dump, since that request was first.