Mobile phone security
These are some basic tips for keeping data on your phone secure.
Last updated
These are some basic tips for keeping data on your phone secure.
Last updated
Always have a passcode on your phone made up of numbers and/or letters. Don't tell it to anybody that has access to your phone. You may consider telling your passcode to a friend that lives far away so that they can unlock your phone in the case that something happens to you.
In the United Staes, law enforcement to turn over the passcode to your phone because the Constitution protects you from self-incrimination.
However, law enforcement might be allowed to use your face or fingerprint to unlock your phone. This is an , but the safest thing is to avoid the debate and always use a numeric or alphanumeric passcode.
Phones are easily lost, damaged, or stolen. It is important to back up the information on your phone if you do not lose it.
Fake cell phone towers go by a few different names:
Cell-site simulator
(a brand-name IMSI-catcher manufactured by Harris Corporation)
These are all radio devices that send out signals advertising themselves as cell phone towers for your phone to connect to. Often, these devices then note your phone's identity and disconnect, returning you to a real cell phone tower.
It may be safer and more secure to conduct your activist work on a separate cell phone than you use for your personal life.
Many mobile phone stores will require you to show a government ID in order to purchase a phone. When this happens, you should not consider the use of your phone to be untrackable by the government.
Apple iOS devices have a reputation for stronger security when compared to Android or other devices. However, Android phones are often cheaper.
The information you store in your burner phone and your real phone should not connect to each other. The two phones should not be in the same contact list.
Your phone's Wi-Fi and Bluetooth connections can be used to discern a lot of information about who you are and where you have been. For example, if your car offers Bluetooth connections, don't connect both your real phone and your burner phone, because that gives a hint to anyone examining both devices that they owned by the same person.
There is the presence of fake cell phone towers, and it is harder for fake cell phone towers to intercept connections using the latest protocols. However, you should assume that the only way to avoid detection from a fake cell phone tower is to turn off your phone's cell radio.
The Electronic Frontier Foundation about how fake cell phone towers work.
Syncing your burner phone to the cloud makes it easier for law enforcement or computer hackers to obtain the information on it. If you need to make backups, backup your phone locally to your computer. Apple's iTunes to create encrypted local backups of an iPhone.