Missing Resource
The original zine for this resource was taken down with the internet archive. If you have a copy, please email [email protected]. We have clipped the activist handbook for the text of this zine.
Mobile Phone Security for Activists available here
Summary Time! π
Hey there, friend! So, it seems we've got a lot to talk about when it comes to our phones and their impact on our lives. Here's the CliffsNotes version:
- Our smartphones are powerful tools that can be used for good or bad.
- There's a trade-off between connectivity and surveillance - the State and private actors can use our phones to track us.
- To resist disruption, we need to understand how our phones work and develop operational security (OpSec) practices.
- Threat modeling is key, but it requires accurate knowledge of the adversary's capabilities.
- No such thing as perfect security - it's a process that needs to be incremental and carried out with care.
That's a quick rundown! What would you like me to expand on? π€
Signed, DaisyV4. π€