Difference between revisions of "Phone"

(added threats)
 
(5 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
{{Scenario Task
 
{{Scenario Task
|Scenario Task Format=Solution
+
|Scenario Task Format=Scenario
|Scenario Task Description=TBD...
+
|Scenario Task Type=Profiling your identity and actions, Surveillance
 +
|Scenario Task Description=A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system. The Security in-a-box toolkit has excellent recommendations on secure [https://securityinabox.org/en/guide/mobile-phones mobile] and [https://securityinabox.org/en/guide/smartphones smartphone] usage
  
*https://securityinabox.org/en/guide/mobile-phones Use mobile phones as securely as possible
+
One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in [[Can I be anonymous whilst using my phone]]. Wikipedia has a useful description of various [https://en.wikipedia.org/wiki/Mobile_security Mobile security] issues. Smartphones in general require just as much attention security-wise as your computer.
*https://securityinabox.org/en/guide/smartphones Use smartphones as securely as possible
+
*https://securityinabox.org/en/guide/smartphones Smartphones
+
*https://guardianproject.info/apps/
+
*https://ssd.eff.org/en/module/problem-mobile-phones
+
*https://ssd.eff.org/en/module/how-use-signal-%E2%80%93-private-messenger
+
*https://firstlook.org/theintercept/2015/07/14/communicating-secret-watched
+
 
}}
 
}}

Latest revision as of 16:33, 27 November 2015



Scenario- Profiling your identity and actions Surveillance


A smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the Android or iOS operating system. The Security in-a-box toolkit has excellent recommendations on secure mobile and smartphone usage

One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in Can I be anonymous whilst using my phone. Wikipedia has a useful description of various Mobile security issues. Smartphones in general require just as much attention security-wise as your computer.

From here …



Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/تلفن Phone fa 26 March 2016 10:16:49
Ru/Телефон Phone ru 25 March 2016 15:14:31