About privacy and mobile devices

- do not use smartphone :-)

- if you use smartphone, do not enable location service by default

- and do not store credit card information on smartphone

- and use it with encrypted storage

- and use strong authentication

- if you use smartphone, do not user social media :-) (except #nostr)

- if you use social media, do not use centralized, especially multi company owned social media (this is why we use #nostr)

- do not share real email address

- and do not share real mobile number

- never use or share real name

- never share any information that could identify your real identity

- do not share photos, videos, about yourself, your family

- do not share infos about your home location, enterieurs, real workplace, etc.

- do not use any apps on your mobile that takes infos about you

- do not use any services that can build your profile

- use only trusted (and probably FOSS) apps

- do not use mobile phone that is bounded to a telco service provider

- do not use mobile phone that bounds you to the mobile manufacturer, and/or operating system provider and/or application developer

- do not use wearable devices, smartwatches, that can share infos about you through mobile phone, even directly

- do not use cloud services

- do not syncronize phones with another devices using clouds

- do not connect to a passwordless wifi

- don't trust anyone or anything that you haven't personally verified before

Conclusion:

- nowadays it is nearly impossible to follow all the rules above

- don't be lazy and don't believe anyone who tries to sell you all this as a "convenience" service

--- So reduce your digital footprint as much as you can! ---

#privacy #mobile #smartphone #security #trust #grownostr #plebchain #notrians #nostriches #nostr #zap

Thank you for the list. 💾 What about two factor authentifications as sms on a mobile phone?

Reply to this note

Please Login to reply.

Discussion

Sms is vulnerable, because IMSI catcher, a MITM hacking technique. The authenticators are better. It is worth to use FOSS app. On Android it is e.g. andOTP or Aegis if you want to use Google Authenticator compatible app.

2FA can contain 2 of 3 different kind of auth. Based on:

- knowledge (e.g. sms or authenticator)

- possession (e.g. mobile phone)

- inherence (e.g. fingerprint)

So you have to chose 2 different. But some authenticator accept fingerprint instead of numbers provided

I'm just at the beginning of taking care of my privacy online. But i will come back to this one when it's time. I think it will be important that i know something so my kids don't give all their data for free. Thank you.

You are welcome