Browse wiki

Phone
Scenario Task Description A smartphone is a small computer in your pA smartphone is a small computer in your pocket, and all of the vulnerabilities mentioned throughout other sections of this guide apply. The solutions are more or less the same as those for a computer, only with different software. In most cases your smartphone will be running a version of the [https://www.android.com/ Android] or [http://www.apple.com/ios/ iOS] operating system. The Security in-a-box toolkit has excellent recommendations on secure [https://securityinabox.org/en/guide/mobile-phones mobile] and [https://securityinabox.org/en/guide/smartphones smartphone] usage One major difference between a computer and a phone is that the latter always gives away its location to the cellular network. You can read more about this in [[Can I be anonymous whilst using my phone]]. Wikipedia has a useful description of various [https://en.wikipedia.org/wiki/Mobile_security Mobile security] issues. Smartphones in general require just as much attention security-wise as your computer. attention security-wise as your computer.
Scenario Task Format Scenario +
Scenario Task Name Phone
Scenario Task Type Profiling your identity and actions + , Surveillance +
Has queryThis property is a special property in this wiki. Phone + , Phone + , Phone +
Categories Top Level Scenario Task  + , Scenario Task  +
Modification dateThis property is a special property in this wiki. 27 November 2015 16:33:15  +
hide properties that link here 
Fa/تلفن + , Ru/Телефон + Base Page
Can I be anonymous whilst using my phone + , How can I access censored websites from my phone + , How to protect your phone from virus infection + , I want to communicate securely + , Protect files and messages on my phone + , Useful apps for my phone + Scenario Task Parent
 

 

Enter the name of the page to start browsing from.