Smartphone Security For The Privacy Paranoid

Advanced Guide To Practical Privacy

Reliance GCS
Mar 4, 2019 · 25 min read
Image for post
Image for post

SMARTPHONE PRIVACY ESSENTIALS

Personal data stored on a smartphone is often worth more than the smartphone itself. It also means that more people are holding potential security threats right in their hands. While the functionalities of mobile phones are endless, the risks to our personal privacy are very real.

  • App attacks: App attacks are typically a result of bad development and coding.
  • Malware attacks: Malware attacks, which are increasing in numbers, can steal your photos, hijack your camera, and erase important files.
  • Communication based attacks, such as those on Wi-Fi or Bluetooth: Attacks on communication networks happen when users log into an insecure or faulty network.
Image for post
Image for post
  • Select your app of choice, then tap Permissions.
  • From there, you can exercise granular control over what the app can and can’t access.
  • Also consider removing administrator privileges of unwanted applications by visiting Settings > Security & lock screen > Device admin apps.
  • Or go app by app; just tap Settings and scroll until you hit the app you want to audit.
Image for post
Image for post
  • Look at the download statistics: If you are attempting to download a popular app like WhatsApp, but it has an inexplicably low number of downloads, that is a fairly good indicator that an app is most likely fraudulent.
  • Read what others are saying: When it comes to fake apps, user reviews are your ally. Just going through a few can provide vital information as to whether an app is authentic or not.
Image for post
Image for post
Image for post
Image for post
  • Recent security events
  • Sign-in & recovery
  • Third-party access
Image for post
Image for post
  • Location History
  • Device Information
  • Voice & Audio Activity
  • YouTube Search History
  • YouTube Watch History
Image for post
Image for post
  • Click on the Delete activity by in the left navigation.
  • Click on the Down arrow ˅ and select All time.
  • Click Delete.
  • At the bottom right corner click on the cog settings icon.
  • Choose Delete all Location History.
  • Click on the Delete activity by in the left navigation.
  • Click on the Down arrow ˅ and select All time.
  • Click Delete.
  • Click on the Delete activity by in the left navigation.Click on the Down arrow ˅ and select All time.
  • Click Delete.
  • Click on the Delete activity by in the left navigation.
  • Click on the Down arrow ˅ and select All time.
  • Click Delete
  • YouTube survey answers
  • Google Word Coach
  • Interests & notification subscriptions
  • Data shared for research
  • Product price tracking
Image for post
Image for post
Image for post
Image for post
Image for post
Image for post
Image for post
Image for post

ADVANCE SECURITY MEASURES FOR THE EXTRA PARANOID

Image for post
Image for post

WRAP UP

Image for post
Image for post

References:

1.Featured Image: GIF from donottrack blog: https://blog.donottrack-doc.com/how-to-protect-your-smartphone/
2.Image 1: Photo from CASEY CHIN via Wired.com: https://www.wired.com/story/how-to-check-app-permissions-ios-android-macos-windows/
3.How to Keep Your Smartphone From Getting Hacked | WIRED: https://www.wired.com/story/smartphone-security-101/
4.Image 2: Photo from iStock / serazetdinov via Wired.com: https://www.wired.co.uk/article/uk-surveillance-unlawful-watson-davis
5.Smartphone Security 101 | Wired: https://www.wired.com/story/smartphone-security-101/
6.Are Fake Apps Taking Over Your Phone? | McAfee Blogs: https://securingtomorrow.mcafee.com/consumer/mobile-and-iot-security/fake-apps-taking-over-phone/
7.Image 3: Photo from THEN ONE via Wired.com: https://www.wired.com/2016/03/want-safer-passwords-dont-change-often/
8.Image 4: Photo from Getty Images via Wired.com: https://www.wired.com/2017/03/good-news-androids-huge-security-problem-getting-less-huge/
9.How to Manage Your Google Privacy Settings | PCMag.com: https://in.pcmag.com/dropbox/120272/how-to-manage-your-google-privacy-settings
10.Image 5: Photo from ALYSSA WALKER; GETTY IMAGES via Wired.com: https://www.wired.com/story/apple-blocks-google-employee-apps/
11.Third-party sites & apps with access to your account | Google Account Help: https://support.google.com/accounts/answer/3466521?hl=en
12.Image 6: Photo from ALBERTO PEZZALI/NURPHOTO/GETTY IMAGES via Wired.com: https://www.wired.com/story/google-plus-bug-52-million-users-data-exposed/
13.Image 7: Photo from Getty Images via Wired.com: https://www.wired.com/story/google-chrome-login-privacy/
14.Image 8: Photo by Author
15.Image 9: Photo via threatpost.com: https://threatpost.com/down-the-rabbit-hole-with-a-blu-phone-infection/128390/
16.How to Uninstall Carrier/OEM Bloatware Without Root Access | xdadevelopers: https://www.xda-developers.com/uninstall-carrier-oem-bloatware-without-root-access/
17.How to Get Rid of Bloatware on Your Android Phone | How-To Geek: https://www.howtogeek.com/115533/how-to-disable-or-uninstall-android-bloatware/
18.Image 10: Photo from Getty Images via Wired.com: https://www.wired.com/story/upnp-router-game-console-vulnerabilities-exploited/
19.New Year's resolutions: Routing done right | WeLiveSecurity: https://www.welivesecurity.com/2019/01/17/new-years-resolutions-routing-done-right/
20.Image 11: Photo from Kaspersky Blog: https://www.kaspersky.co.in/blog/cyber-detective-tiportal/14518/
21.Online security 101: Tips for protecting your privacy from hackers and spies | ZDNet: https://www.zdnet.com/article/simple-security-step-by-step-guide/
22.Internet privacy tips for the truly paranoid | Grunge: https://www.grunge.com/10383/internet-privacy-tips-truly-paranoid/
23.21 tips - tricks and shortcuts to help you stay anonymous online | The Guardian: https://www.theguardian.com/technology/2015/mar/06/tips-tricks-anonymous-privacy
24.Help protect your digital footprint from prying eyes | Norton: https://us.norton.com/internetsecurity-privacy-clean-up-online-digital-footprint.html
25.Zhang - Xiaolu & Baggili - Ibrahim & Breitinger - Frank. (2017). Breaking into the vault: Privacy - security and forensic analysis of Android vault applications. Computers & Security. 70. 10.1016/j.cose.2017.07.011.
26.Edward Snowden's new app turns any Android phone into a surveillance system | TechCrunch: https://techcrunch.com/2017/12/24/edward-snowden-haven-app/
27.Physical Measures To Amp Up Your Digital Security | Wired.com: https://www.wired.com/story/physical-security-measures/
28.Image 12: Photo from Owni /-) - CC by NC - via Flicker.com: https://www.flickr.com/photos/ownipics/4839933569/
29.We don't want to sell our data - we want data rights! | Privacy International: https://privacyinternational.org/blog/2683/we-dont-want-sell-our-data-we-want-data-rights
30.An overview of the changing data privacy landscape in India | PWC India: https://www.pwc.in/research-insights/2018/an-overview-of-the-changing-data-privacy-landscape-in-india.html
31.Privacy as a Political Right | Privacy International: https://privacyinternational.org/report/705/privacy-political-right

InfoSec Write-ups

A collection of write-ups from the best hackers in the…

Reliance GCS

Written by

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

Reliance GCS

Written by

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch

Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore

Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store