Difference between revisions of "Phone"
Line 1: | Line 1: | ||
{{Scenario Task | {{Scenario Task | ||
|Scenario Task Format=Scenario | |Scenario Task Format=Scenario | ||
− | |Scenario Task Description=A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system. | + | |Scenario Task Description=A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system. The Security in-a-box toolkit has excellent recommendations on secure [https://securityinabox.org/en/guide/mobile-phones mobile] and [https://securityinabox.org/en/guide/smartphones smartphone] usage |
One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in [[Can I be anonymous whilst using my phone]]. Smartphones in general require just as much attention security-wise as your computer. | One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in [[Can I be anonymous whilst using my phone]]. Smartphones in general require just as much attention security-wise as your computer. | ||
}} | }} |
Revision as of 00:20, 18 September 2015
Scenario
A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the Android or iOS operating system. The Security in-a-box toolkit has excellent recommendations on secure mobile and smartphone usage
One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in Can I be anonymous whilst using my phone. Smartphones in general require just as much attention security-wise as your computer.
From here …
- Can I be anonymous whilst using my phone
- How can I access censored websites from my phone
- How to protect your phone from virus infection
- I want to communicate securely
- Protect files and messages on my phone
- Useful apps for my phone
Base Page | Language | Modification dateThis property is a special property in this wiki. | |
---|---|---|---|
Fa/تلفن | Phone | fa | 26 March 2016 10:16:49 |
Ru/Телефон | Phone | ru | 25 March 2016 15:14:31 |