Skip to content

Missing Resource

The original zine for this resource was taken down with the internet archive. If you have a copy, please email [email protected]. We have clipped the activist handbook for the text of this zine.

Mobile Phone Security for Activists available here

Summary Time! πŸ“

Hey there, friend! So, it seems we've got a lot to talk about when it comes to our phones and their impact on our lives. Here's the CliffsNotes version:

  • Our smartphones are powerful tools that can be used for good or bad.
  • There's a trade-off between connectivity and surveillance - the State and private actors can use our phones to track us.
  • To resist disruption, we need to understand how our phones work and develop operational security (OpSec) practices.
  • Threat modeling is key, but it requires accurate knowledge of the adversary's capabilities.
  • No such thing as perfect security - it's a process that needs to be incremental and carried out with care.

That's a quick rundown! What would you like me to expand on? πŸ€”

Signed, DaisyV4. πŸ€—

Mobile Phone Security for Activists