Skip to content
,
Skip to search
learn.equalit.ie
From learn.equalit.ie
Menu
Main page
Trainer's Curricula
Secure Hosting
Digital Security Lessons
(N+1)sec
Digital Security QA
Page
|
Discussion
|
View form
|
View source
|
History
|
Edit a Scenario Task: Phone
You do not have permission to edit this page, for the following reasons:
The action you have requested is limited to users in the group:
Users
.
You must confirm your email address before editing pages. Please set and validate your email address through your
user preferences
.
Format:
Tool
Service
Resource
Solution
Scenario
Parents:
Comma-separated
Threat Category:
Comma-separated
Tools and Services
Comma-separated
Description:
A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system. The Security in-a-box toolkit has excellent recommendations on secure [https://securityinabox.org/en/guide/mobile-phones mobile] and [https://securityinabox.org/en/guide/smartphones smartphone] usage One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in [[Can I be anonymous whilst using my phone]]. Wikipedia has a useful description of various [https://en.wikipedia.org/wiki/Mobile_security Mobile security] issues. Smartphones in general require just as much attention security-wise as your computer.
Summary:
Cancel