Changes

Phone

573 bytes added, 8 years ago
added threats
{{Scenario Task
|Scenario Task Format=SolutionScenario|Scenario Task Type=Profiling your identity and actions, Surveillance|Scenario Task Description=TBDA smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system.The Security in-a-box toolkit has excellent recommendations on secure [https://securityinabox.org/en/guide/mobile-phones mobile] and [https://securityinabox.org/en/guide/smartphones smartphone] usage
*https://securityinaboxOne major difference between a computer and a phone is that the latter always gives away its location to the cellular network.org/en/guide/mobile-phones Use mobile phones as securely as possible*https://securityinaboxYou can read more about this in [[Can I be anonymous whilst using my phone]].org/en/guide/smartphones Use smartphones as securely as possible*Wikipedia has a useful description of various [https://securityinabox.org/en/guide/smartphones Smartphones*https://guardianproject.info/apps/*https://ssd.effwikipedia.org/enwiki/module/problem-mobile-phones*https://ssdMobile_security Mobile security] issues.eff.org/en/module/howSmartphones in general require just as much attention security-use-signal-%E2%80%93-private-messenger*https://firstlookwise as your computer.org/theintercept/2015/07/14/communicating-secret-watched
}}
Bureaucrat, administrator
312
edits