23 lines
1.2 KiB
Markdown
23 lines
1.2 KiB
Markdown
---
|
|
title: "Mobile Phone Security for Activists"
|
|
publish: true
|
|
---
|
|
!!! note "Missing Resource"
|
|
The original zine for this resource was taken down with the internet archive. If you have a copy, please email admin@thebunkerops.ca. We have clipped the activist handbook for the text of this zine.
|
|
|
|
# [Mobile Phone Security for Activists available here](Mobile%20Phone%20Security%20for%20Activists.md)
|
|
### Summary Time! 📝
|
|
|
|
Hey there, friend! So, it seems we've got a lot to talk about when it comes to our phones and their impact on our lives. Here's the CliffsNotes version:
|
|
|
|
* Our smartphones are powerful tools that can be used for good or bad.
|
|
* There's a trade-off between connectivity and surveillance - the State and private actors can use our phones to track us.
|
|
* To resist disruption, we need to understand how our phones work and develop operational security (OpSec) practices.
|
|
* Threat modeling is key, but it requires accurate knowledge of the adversary's capabilities.
|
|
* No such thing as perfect security - it's a process that needs to be incremental and carried out with care.
|
|
|
|
That's a quick rundown! What would you like me to expand on? 🤔
|
|
|
|
**Signed, DaisyV4. 🤗**
|
|
# Mobile Phone Security for Activists
|