Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • How to secure a basic mobile phone?
  • How to secure a smartphone or a tablet?

Securing a mobile phone or a tablet

PreviousSafety and security strategiesNextFAQ on mobile phones

Last updated 7 years ago

How to secure a basic mobile phone?

A phone that has the primary purpose of only calling & sending text messages.

Insert GIF BASIC PHONE

VULNERABILITIES

These phones constantly give out information about your location through calls, texts and other services. Mobile and landline network providers, and well-equipped third-parties may have access to the call, text and data information that passes through their networks, though this may be difficult to access unless your abuser is considerably influential. Information about who you call can be used to build a

GPS enabled phones share embedded information in photos, SMS messages, and internet requests such as location. You can receive malware through opening links in text messages, or MMS. Switching off the phone DOES NOT make it completely safe from surveillance unless the battery is removed. Unless you know your abuser/stalker works in intelligence or knows people who do, do not remove the battery in case you need your phone in an emergency.

ACTIONS

  1. Get a new phone and SIM card that your abuser has no connection to.

  2. Always use your phone's security lock codes or Personal Identification Numbers (PINs) and keep them secret (unknown to others).

  3. Always change these from the default factory settings.

  4. The 15-digit serial or IMEI (International Mobile Equipment Identity) number helps to identify your phone and can be accessed by keying *#06# into most phones, by looking behind the battery of your phone or by checking the phone's settings. Make a note of this number and keep it separate from your phone, as this could help to trace and prove ownership quickly if it is stolen.

  5. Do not give your number out to anyone who you don’t completely trust.

  6. Disable Bluetooth and GPS when you are not using them.

  7. Do not store sensitive information on your phone.

  8. Do not send messages with sensitive information in them.

  9. Never leave your phone unattended.

  10. Never sign into your accounts on someone else's phone.

  11. Observe your phone's behaviour and functions.

  12. Look out for unknown programmes and running processes, strange messages and unstable operation.

  13. If you don't know or use some of the features and applications on your phone, disable or uninstall them if you can.

  14. Use a .

  15. Don’t pick up and answer calls from numbers you don’t recognise.

High Risk level: Do not register your phone with a service provider - only use a prepaid SIM card. Change phones and SIM cards often. If you can’t get a Prepaid SIM card without registering your identity, then do not use a phone for a while. You can also try to get a trusted relatively/friend to register for a SIM card under their name to avoid detection. Switch off the phone and remove the battery completely to avoid surveillance.

How to secure a smartphone or a tablet?

An internet-enabled mobile phone - kind of like a mini computer.

Information also applicable to Tablet devices.

GIF SMARTPHONE

VULNERABILITIES

  1. Unauthorised access to device storage when your data and device isn’t secured or encrypted.

  2. Internet-enabled apps

  3. Tracking apps (malware).

  4. Mobile bugging/wiretapping

  5. Bluetooth

  6. Camera

  7. Geotagging

ACTIONS

Same tips as above but here are some additional ones:

  1. Disable Wi-Fi, mobile data, Bluetooth and GPS when you are not using them.

  2. Educate yourself about the apps on your phone, know exactly what they do and what information they store.

  3. Turn off location services throughout the apps on a phone, but in particular, on the camera and on the social media.

  4. DO NOT log into Google Maps. Google Maps tracks your every movement unless you turn it off, and you can be tracked remotely through the app.

  5. For apps that you trust, restrict unnecessary app permissions.Remove suspicious and unfamiliar apps as these may be malware.

  6. Delete apps which store location or any other information.

  7. When using someone else’s device or a public computer, sign in with precaution. If you do - delete your history and saved passwords.

  8. Encrypt the storage medium (the phone storage and /or additional SD card).

  9. If necessary get a new phone and new phone number.

  10. Use apps which encrypt information wherever possible.

High threat level: Ditch your internet-enabled phone or keep it only for emergencies. Never give your number out to anyone you don’t completely trust. Use a pay phone if possible. Make sure the pay phone isn’t located too near your residence or workplace or any place that your stalker can link to you.

These phones constantly give out information about your location through calls, texts and other services. Mobile and landline network providers, and well-equipped third-parties may have access to the call, text and data information that passes through their networks, though this may be difficult to access unless your abuser is considerably influential. Information about who you call can be used to build a

can be accessed if they are not protected.

can be used to track your smartphone.

Smartphone devices can be .

Someone may have downloaded a tracking app onto your phone in order to track you. Go through your applications and delete them.

Google Play tracks your location as well, make sure you’re signed out of the Play store and your GPS is turned off. See

Use incognito or private mode on

If you’re not comfortable with websites having your mobile number use an app like .

Some accounts (Google and Facebook) have the option to remotely log yourself out of all devices. See

Use an anti-virus/malware scanner on your smartphone. Recommended: ;

revealing personal profile.
Google Voice Number
revealing personal profile.
Passwords
Spyware
hacked via public mobile charging points
Here are some examples of these tracking apps.
Delete Google Maps? Go ahead, says Google, we'll still track you
mobile web browsers
Burner
How to Log Out From Gmail, Facebook and Other Web Services Remotely
ZoneAlarm
Remove Spyware on Smartphone