If you are protecting your technology and your first thought isn't your mobile device then you are not going to make it. In my opinion mobile security is always my first priority.

What you use most should be the most important of all things you have to protect, for most, that is your phone. The technology you carry around with you on a day to day schedule has far more data worth something to a threat. Where ordinary people spend time more on their phone than they do a computer, a phone is the golden ticket to your life. Even if you have nothing of value to worry on compromise now, it doesn't mean that will not have something valuable later after further use.

Where a computer manages day to day work tasks, a phone often manages people's lives. They are an irreplaceable tool in society. Your communications, photos, videos, documents, online activity or possibly even your finances and identity are managed on portable devices.

The most promenant attack campaigns we know from world affairs involve targeting smartphones, some of the most expensive bounties for zero-days involve mobile software, and there are multiple industries whose main objectives are to find and attack smartphones. Threat actors love smartphones.

Protect what is most valuable.

Reply to this note

Please Login to reply.

Discussion

And your suggestion on how to do this are...?

GrapheneOS

Buying a new phone soon and will start with foundational security.

Agree.

I've personally recently begun a journey of finding out what it takes to use my phone in a private and secure manner.

It's quite an interesting project, that I can recommend to anyone eager to learn about the digital footprint.

Buy a google pixel, install grapheneOS on it, and from there, start the project of how you migrate your usual phone usage without attaching your identity.

For me, so far, that has taken me through so many cool services like:

- silent.link (paid with lightning)

- mullvad VPN (paid with lightning)

- namecheap domain (paid on chain)

- proton unlimited (paid on chain)

- proton includes simplelogin which is now completely invaluable to me

- jmp.chat for voip phone service (paid on chain)

- android profiles for phone use case silo-ing

Just generally taking things step by step migrating a phone usecase at a time, taking into consideration what would be necessary to keep private and secure in order to use a specific app or service.

Well said. I would recommend Extreme Privacy by Michael Bazzel as a guide to manage your privacy.

Don't store any data on your phone when possible. No photos, no downloads/files, no saved keys/passwords, no location, no Bluetooth, no biometrics, forced private browsing w/o history or "any saved data". Little-no apps, browser only. Don't sign into anything. I understand that's difficult for most, but once you understand that you are often trading convenience for privacy/security, the above should be the goal or better imo. I believe there is no miracle pill or bandaid app that can save you, it's about habits.