What is Rostest and is it possible to buy a gray phone? Smartphone protection tips


All commercial buses in Moscow now have a fare payment system using smartphones that support NFC technology. Previously, you could use your phone to pay for travel on the metro, on Moscow Central Circle trains, Aeroexpress trains, as well as on municipal ground transport. In order to do this, you need a smartphone with NFC technology and a special SIM card, which can be obtained for free at the office of your mobile operator. The cost of travel on commercial buses when paying by phone will be 35 rubles, the same as when paying with a Troika card (if paying in cash - 20 rubles more). In total, there are 211 commercial bus routes in the capital, served by eight carriers.
Let's figure out how safe and convenient contactless payment via mobile is.

What is NFC?

This is a short-distance data transmission technology that combines a smart card and a reader into one device. A smart card is any plastic card with an RFID tag, with their help we pass through turnstiles in offices and open entrance doors at home. Any ticket on Moscow public transport or a bank card with contactless payment is also a smart card. It has a microprocessor that, at the moment of contact with a reading device (a turnstile in an office or a terminal in a restaurant), instantly exchanges data, that is, for example, transmits information about its owner security system or allows you to write off a certain amount of money.

Such a microprocessor, called a secure element, can be installed in the phone by the manufacturer or located on a memory card or SIM card. The NFC module, in turn, is installed only at the factory and performs the functions of a controller - that is, it controls this element.

Surely only expensive smartphones have this feature?

Previously, indeed, NFC technology was considered the prerogative of flagship smartphone models. But now a phone with such a module can be bought for 6 thousand rubles, and soon NFC will come to the most budget models smartphones.

What is this function for?

For example, to pay for travel on Moscow transport, few people leave home without a phone, but they might forget their wallet with Troika. In addition, using wallet applications (there are many different variations for all operating systems), you can “link” a bank card to such a smartphone and pay for goods and services with it. In some cases, you can “record” a pass to work or a parking lot on your mobile phone, but in Russia this is still rare - most turnstiles and barriers use a different radio channel that does not recognize NFC.

Why do you need a special SIM card to pay for travel via NFC?

For safety. The fact is that when using the service " Mobile ticket", this is the name of the option that allows you to pay for travel with your smartphone, the money is debited from your personal account from your mobile operator. Therefore, to ensure the secure transfer of funds to the virtual Troika, a separate secure element is needed - on the SIM card.

Do you also need a special SIM card to pay for purchases with your phone?

Most often not. But you almost always need a special application to which you need to “record” your bank card. The latter Apple models Samsung and Samsung already have such applications installed, others need to be downloaded.

Is it safe to pay for purchases with a smartphone?

If you use contactless bank cards (which do not need to be inserted into the terminal, you just need to bring it close to it), then the NFC technology in your phone should not scare you - in most cases it is even safer. There have been precedents for theft of money from contactless cards in Russia, although they are extremely rare, but so far they have not been stolen from NFC devices.

But in theory, if I use this technology, my money could be stolen?

In theory, they can. The media reported that scammers use terminals like the ones we use every day, only modified. In a crowded area, for example in the subway, an attacker can bring such a device to your phone, and the money is debited.

However, this is a very technically complex, expensive and ineffective method of fraud. Not only do you need a special terminal, but you also need to bring it closer to your smartphone than 5-10 centimeters. It is unlikely that you will not notice this. Your device must be unlocked (that is, you cannot perform this operation with the phone in your bag or backpack).
Moreover, almost all contactless cards (including those that are “recorded” on a smartphone) in Russia by default are capable of issuing or transferring no more than 1,000 rubles without additional verification. Upon request larger amount you'll have to enter a PIN, sign a receipt, or place your finger on a fingerprint scanner.
Finally, if you notice that money has been debited from your card linked to your NFC phone, don’t hesitate to contact your bank. The lending institution has the ability to track where the money went. The attacker's account will be blocked, and the funds will be returned to you.

What if my phone with the card written to it is stolen?

In this case, you should do the same as in case of theft and loss of any bank card: Immediately call your bank and ask to block the card. The same should be done with a lost phone number - to do this, you need to call the call center of your operator.

With the advent of the crisis on the Russian market, prices for smartphones, and indeed for all equipment, began to bite. For many, the way out of this situation was the so-called « gray » smartphones. How safe, legal and convenient it is, read more in our article!

What's happened « gray » smartphones

Large smartphone manufacturers rarely limit themselves to one market for selling their products. Devices from brands such as Samsung, Xiaomi, ZTE, Meizu, Lenovo can be found in many countries in Europe, Asia and the countries of the Customs Union. « Gray » a smartphone means that the product was imported into your country illegally, that customs duties were not paid for it, and the manufacturer does not provide its official guarantee.

Initially this smartphone could have been intended for sale in Europe or Asia, but thanks to the cunning of entrepreneurs and holes in legislation, it can be purchased in our country, and much cheaper than from an official dealer.

We also note that certification « growth » absolutely does not mean that the device has been tested and studied by a group of scientists using various equipment and found to be absolutely safe. As a rule, this is a simple formality, and the certification center checks the product for the presence of Russian-language software, instructions, and for compliance with the declared and actual characteristics.

Example prices at the time of writing:

Xiaomi Redmi Note 4 32GB (black) — RUB 14,999 on the liaison website.

Xiaomi Redmi Note 4 32GB (Black) — 9790 RUR in one of the Yandex.Market stores.

The overpayment is simply huge - 50%, but in fact, the devices are absolutely identical.

A few words about the PCT

Many people still ask the seller about the treasured three letters when choosing a smartphone « PCT » . The fact is that the PCT, recently, is not mandatory certification, but voluntary. It no longer affects anything and does not oblige you to anything. With the advent of the Eurasian Economic Union, mandatory certification since August 2013 is called EAC ( Eurasian correspondence). Therefore, if the seller answers in the affirmative to the question whether the device is PCT, this means that the device is still EAC, and the seller is too lazy to explain all these subtleties to you, but yes, it has passed certification. Therefore, it is best to ask if the device official guarantee from the manufacturer, this way you will save time.

Is this legal

Absolutely legal. The seller can sell and you can buy « grey » phone as much as you like. We have no laws prohibiting you from doing this. No one will confiscate your devices. Smartphones are not included in the list of devices that are subject to mandatory certification.

How safe is it

If purchased « gray » The device is not a fake, but an original, then there is no difference between it and the same model for the Russian market. Here you can rather speculate on how safe cell phones are in principle. There are many videos on YouTube about spontaneous combustion of iPhones, and the explosive Samsung Note 7 actually became a meme.

What are the differences?

First of all, you need to find out for which market the device was originally intended. If the device is for Asia, then you will need an adapter plug for Russian sockets and the packaging will have hieroglyphs. If for Europe, then the adapter most likely will not be needed, and the packaging will have inscriptions on English language. The name of the smartphone will contain the symbols EU, which means European Union.

You should also study the model you choose. The fact is that in China you can find a Lenovo P2 model with 64GB of internal memory, and on Russian market this model appeared with a maximum of 32GB of memory on board. Some Xiaomi models released in Europe with support LTE frequencies Band 20. In China there is no support for this frequency, and therefore LTE in Russia will work worse. By the way, no "e vrotest » does not exist, by this the sellers want to say that the device is not certified for Russia, and they hope that the buyer will have a kind of trigger for the “Euro” prefix. Examples of this are words such as European-quality repair, European-quality, European-standard.

How to check certification

If the seller claims that the device « growth » , but something bothers you, then this information can be easily checked. To do this you need to call hotline manufacturer and name the IMEI of the device.

IMEI is a unique gadget identifier. This is something like a license plate on a car - a very rough analogy, but in principle it fits. It can be found on the packaging or on the smartphone itself if you type the command *#06#.

Some manufacturers also provide online database for verification, but it is better not to trust such databases, because the information there is not updated often. Also, the device, of course, must come with a charger without any adapters, with information in Russian on the box and with fully Russified firmware. It is best when the device is sealed and unpacking happens in front of you.

It is very difficult to distinguish a fake smartphone from an original one if you have not seen the original. Externally, the smartphones will look very similar. Here are two pieces of advice:

1) if you have already chosen specific model, then it is advisable to look at reviews and remember how and what should look externally. Better yet, save the pictures and compare them when purchasing.

2) stock up on the free CPU-Z program. It will demonstrate what hardware is installed on the smartphone. The program also has a useful function Online Validation In chapter About. By clicking there you will need to enter your name and email optionally. After this, the program will compare the hardware of your device with that declared by the manufacturer. My Xiaomi Mi Max has passed the test, as evidenced by the green seal. Although the device was not tested on the official website at the time of purchase.

Firmware

Devices « growth » (EAC) always come with Russian. But if you buy « grey » gadget, it is advisable to check with the seller what firmware it contains. Most uncertified devices are sold with so-called global (international) firmware, but they may also have Chinese Russified firmware, especially if the model is new.

There are no questions about international firmware. They, as a rule, are updated, the Russian language does not disappear in them, and 4G works with all networks. Chinese firmware may not be updated, or updated depriving the user of the Russian language. They may also have various glitches and bugs and it is not a fact that LTE works. A very unpleasant aspect of such firmware is that when resetting the settings, Chinese may appear.

When buying a gray smartphone, be sure to pay attention to the firmware. And if the model is new, then it is better to wait for the release of the international firmware and buy it right away.

Important point. The phone must be without, otherwise online banking will not work, which is not very convenient.

Is it worth buying a non-Rostest smartphone?

It is difficult to answer this question unambiguously. If you are an experienced user and have studied this issue, then of course yes. For those who don't know what it is recovery, global And band We can also recommend such a device, the main thing is that it has good international firmware.

And it is very important to buy from a good and trusted store, because only the store provides a guarantee for such smartphones. Purchase « gray » Buying a smartphone from an unverified seller is a risk, and if something happens, it will be difficult or even impossible for you to repair your smartphone under warranty.

All mobile phones support voice and text communication. And these days, most devices can do much more. Mobile phones have become an integral part Everyday life, largely due to its portability, versatility and relatively low cost. The same qualities make them valuable to human rights defenders, who often use smartphones to share sensitive data and store sensitive information in ways that were previously common on secure computers.

Our guide is primarily dedicated to smartphones, devices Android And iOS with mobile communication functions, with the possibility of voice and text communications, often with Internet access. The list of smartphone functions is constantly growing: cameras, digital data storage, motion sensors, geo-navigation receivers (GPS), wi-fi, easy access to a motley collection of applications. A significant portion of this guide may also apply to other mobile devices, e.g. feature phones(regular old-fashioned mobile devices) and tablets. The latter are often large smartphones increased power, although they do not support mobile communication functions.

What will you learn from this guide?

  • Important data is becoming more portable - what to do about the risks
  • Why mobile voice and text communications are especially vulnerable to surveillance
  • What steps should you take to improve the security of your smartphone when transferring and storing data, taking photographs, visiting websites, etc.
  • How to increase your chances of remaining anonymous (if necessary)

General information about mobile phones

Smartphones are one of the most powerful technologies available to most people. These devices are stuffed with various sensors, are almost always at hand, and are usually connected to one or another network. In general, there are most of the security risks that we usually associate with computers, plus a number of additional problems arising from portability, multi-functionality, insecurity network architecture, location tracking, image capture, etc.

OS

Most smartphones run on two operating systems: Google Android and Apple iOS. A variety of companies sell Android devices. Their software is often changed by developers and service providers. They hope, and sometimes demand, that device owners work in their mobile networks (and paid, of course). operating room iOS system only works on Apple devices. It seriously makes it difficult to launch applications that have not been approved Apple.

One of the main factors affecting the security of an Android smartphone is regular updates operating system. Some cheaper models don't have access to updates, so they can't fix serious security bugs. This may make you vulnerable to malicious code and various attacks.

Branded and locked smartphones

Smartphones are often sold locked. This means that the device can only work in the network of a specific telecom operator. (Only with a SIM card from this operator). The operator often changes the operating system and installs additional applications on a locked phone. In addition, the operator can disable some functions. The result is apps that cannot be removed or denied access to data, including your contacts and stored information.

Therefore, it is safer to buy a regular, unlocked smartphone, without being tied to a telecom operator. Unfortunately, such smartphones are usually more expensive.

Basic Security Settings

Your smartphone has many settings that you can use to control the security of your device. It is important to know these settings. You can read about some settings and Android applications more details in this guide:

Installing, checking and updating applications

The simplest (and usually safest) way to install an application on a smartphone is to use Google Play for Android or App Store for iOS. Log in to your account on the device - and you can download and install applications.

Android apps are available online in many places, but our "default" advice is to not install apps from anywhere. Some of them contain malicious code. You can read more about malware in the guide on how to protect your devices from viruses and phishing. Install applications only from sources you trust. Be aware that trusted individuals may unintentionally distribute malicious code without knowing it. Applications in Google Play and the App Store are subject to some scrutiny from Google and Apple, respectively. This provides certain protection from outright malicious applications.

There's also a solution for experienced Android users - or those who don't want or can't use Google Play. This F-Droid, an alternative selection of programs that only contains FOSS-applications. If you need access to F-Droid, you can install the corresponding application from a trusted source and then use it to install other applications. You can also install applications directly from files .apk (Android packages), if you enable the function installations unknown applications . Yes, it's risky, but if you have no other way to install the right application, you can ask someone you trust to give you .apk-file on the memory card.

Even "official" apps behave badly sometimes. On Android devices, each application asks permission to perform certain actions. You should pay attention to exactly what permissions programs ask for. If it's something illogical, check the reasons and consider not giving permission and deleting the app. If you wanted to install a news reader app and it asks you to allow it to send your contacts over the network to a third party, there is cause for concern. (Some developers collect lists of contacts for sale or independent use for marketing purposes).

Try to update apps promptly and remove those you don't use. The developer can sell his creation to other people, and they will modify the application that you already have installed and add malicious code to it.

Mobility and data vulnerability

The mobile phones we carry with us everywhere often contain important information. Call history, browser browsing history, text and voice messages, address books, calendars, photos and other useful things can lead to a chain of troubles if the device on which they were stored is lost or stolen. You need to know where important information is located on your mobile phone, as well as online data that you can automatically access. This data can fuel a threat not only to the device owner, but also to anyone who finds themselves in address book, in incoming messages or in a photo album.

So you've thought through the risks and become familiar with the security and privacy features of your device. It's time to start taking protective measures.

We store information on a smartphone

U modern smartphones Lots of storage space. It may be easy for someone with physical access to the device to retrieve this information. (Of course, this also depends on the device itself).

Encrypting the device and data on it

IN modern devices On iOS, strong encryption is enabled by default (of course, you must set strong password). Android also supports device encryption, and you can usually turn it on. Don't forget to back up your smartphone data before encrypting the entire device. This will come in handy if any problem arises during the encryption process.

Android also allows you to encrypt data on memory cards (for example, microSD), if you use them.

When you turn on an encrypted phone and enter the password, you gain access to read and change data on the device. Anyone with physical access to your phone when it's turned on and unlocked can get to your data. To be more confident - for example, before crossing a border or going through airport security - it is better to turn off the device completely.

Of course, there are not only pros, but also cons. For example, if you think you might need to make an urgent call, it might be better to leave your phone on and simply lock the screen.

If you can't fully encrypt your device (or you need additional security to separate files), try installing some data encryption application. Some applications encrypt their own data, and, for example, OpenKeychain allows you to encrypt third party files. Using this application together with the program K-9 Mail, you can send and receive encrypted messages. (There are no analogues to this on iOS). Apps like these can help protect valuable information, but you should still consider encrypting your device.

It makes sense to minimize the amount of valuable data you store on your device, especially if it's not encrypted. Some phones have a feature that allows you not to store the history of calls and SMS messages. You can get into the habit of deleting important data from your call and message history.

Secure password storage

Passwords can be stored in a single encrypted file if you install the FOSS application KeePassDroid. The only one in this application, but very reliable master password used for protection all others passwords. Those, in turn, can be very long and unique for all accounts, and there is no need to remember them. KeePassDroid has a built-in password generator, which is convenient to use when creating new accounts.

If you use KeePassXC or KeePassX on your computer, as described in the guide on creating and storing strong passwords, you can copy your database (file .kdbx) to a mobile device.

Available for iOS similar application called MiniKeePass.

The first step to protecting information on your mobile phone is to restrict access to the device. You should keep it on at all times, except in situations where there are special risks. This applies to both SIM cards and memory cards. Even if you are wary of viruses or advanced surveillance, it may be safer to remove the battery and keep the smartphone with you instead of leaving the device unattended.

So, enable encryption and keep your smartphone with you. What else can you do to physically secure your mobile device and reduce damage if it is lost or stolen?

Basic Steps

    Always use a strong screen lock code and try not to give it to anyone. If you have a simple phone with a default code, change the code.

    You should not store important information, including phone numbers, on a SIM card because they cannot be encrypted there.

    Back up important phone data periodically. Save them to your computer or external media. Keep backups in a safe place, as we discussed in the chapter on protecting important files on your computer. if you have backup copy, it’s easier to remember what information was on the phone and, if necessary, return to the factory settings.

    Phone numbers are often linked to important accounts. An attacker may need your phone to gain access to these accounts or to impersonate you. Some mobile operators allow the client to protect their account with a PIN code or password to prevent anyone from making changes to the account or stealing the phone number. If such a feature is available, use it.

    Worried about malicious code? It might make sense to have a small sticker that temporarily covers your phone's camera.

About loss and theft

    Mobile devices have a 15-digit International Mobile Equipment Identity (IMEI). This code allows you to identify the device on the network. Changing the SIM card does not change the IMEI. Code is often written under removable battery. Most phones will show the IMEI in settings and/or when prompted for *#06# . Write down the IMEI. He can help you prove that you are indeed the owner of the stolen phone.

    Think about the pros and cons of registering your phone with a carrier. If you report your phone missing, your carrier usually has the ability to disconnect the phone. However, registering your device further ties your identity to your phone.

    Most Android phones and iPhones have a built-in Find My Phone feature. It allows you to track or disable the device in case of theft. There are independent software developments for the same purpose. Tools like this come with a trade-off, but if you trust the service owner and his software, you can try this option.

What to do if you need to transfer the device to another person

    When you throw away your unwanted phone, give it away or sell it to someone, make sure it doesn't contain information that would normally be stored on a SIM card or memory card. This advice is relevant even if the device has not been turned on for a long time or does not work at all. You can get rid of a SIM card by physically destroying it. Remove the memory card from the device and either destroy it or store it securely. The best way protect the data on your phone - make sure it is encrypted, and then reset the device to factory settings.

    Use only shops and repair shops you trust. This will reduce the vulnerability of your data when you buy a used device or take your device in for repair. If you think someone might have the resources, access or motivation to harass you and install malicious code for this purpose (before you buy the phone), try randomly selecting one of the authorized dealers.

    If you send your phone for repair, remove the SIM card and memory card.

Mobile infrastructure, surveillance and eavesdropping

Mobile phones and cellular networks are even less secure than commonly believed. To send and receive voice and text messages, your phone is always in touch with the nearest cell tower. This way the carrier knows - and records - the location of the phone when it is turned on.

Interception of calls and text messages

Mobile networks are usually privately owned by commercial companies. Sometimes the entire infrastructure mobile network belongs to the telecom operator itself. It happens that the operator resells mobile communications, which is rented from another company. SMS text messages are not encrypted. Voice communications are not encrypted or are only weakly encrypted. Both types of communications are not protected from control within the network itself. As a result, both your telecom operator and the owner cell towers have unlimited access to your calls, text messages and location data. The government, in many cases, also gains this access, even when it does not own the infrastructure itself.

Many countries have laws and regulations that require telecom operators to record and store customers' SMS messages. Most operators, however, do this anyway for the sake of their business objectives, reporting and resolving possible conflicts. Some countries have similar rules for voice communications.

Moreover, the operating system that is installed on a mobile phone may well have been originally designed or modified for a specific telecom operator. Accordingly, the operating system itself may contain hidden functions, which make monitoring even more penetrating. This applies to both simple mobile phones and smartphones.

Third parties may also sometimes intercept voice and text communications. For example, an attacker could use an inexpensive device called catcher IMSI. If such a device is placed in the reception area of ​​a mobile phone, it may mistake the “catcher” for a real cell phone tower. (Sometimes "IMSI catchers" are called Stingrays- a name known among experts, under which these devices are positioned on the market for the needs of law enforcement). In several cases, third parties have even managed to gain access to mobile network resources while being on the other side of the globe. They exploited vulnerabilities in alarm system 7 (Signalling System Number 7, SS7), a set of protocols for the international exchange of voice and SMS messages.

Finally, even if you connect to the Internet via wi-fi rather than cellular, OS on smartphones and tablets encourage users to share their personal data in in social networks And cloud storage; people are encouraged to actively use global geonavigation (GPS) and other similar functions. Many Android and iOS fans like this, and personal data has a greater chance of being leaked online.

Want to protect your most important communications? To get started, ask yourself a few questions:

  • With whom, when and how often do you communicate?
  • Who else might be interested in knowing that you are communicating with this person?
  • How confident are you that your interlocutor is who he says he is?
  • What is the content of your calls and messages?
  • Who else might be interested in this content?
  • Where do you get in touch from, where is your interlocutor located?

If the answers to these questions give you security concerns, you should consider minimizing the risks involved. To do this, you may have to help your interlocutor with mastering new technology or programs. In some situations, it may be better to avoid using your cell phone as a means of communication.

Anonymity

Protecting the content of calls and messages can be challenging. It is even more difficult to remain anonymous when using a mobile phone. In particular, it is rarely possible to hide the fact that you are communicating with a specific person when you make a call or send an SMS. You can use a secure messenger with an Internet connection via a mobile network or Wi-Fi, but how can you guarantee success? Most often, the most you can do is choose which exactly from a third party will be able to access the information, and hope that this party will not closely cooperate with those from whom you want to protect your communications.

To increase the level of anonymity, people sometimes prefer burner phones and short-term accounts. This works in some situations, but getting everything right is not that easy. The simplest choice for both sides of the process - buy prepaid phones, use them for voice calls and SMS messages for a very short time, then destroy them. However, the data cannot be encrypted. The effectiveness of this method depends on a fairly long list of conditions. Here are some:

  • Both parties buy phones and SIM cards in cash.
  • When they do this, no one tracks them by hereby phones.
  • They activate SIM cards without presenting documents.
  • They remove batteries from phones when they are not in use.
  • They can exchange phone numbers without attracting too much attention.
  • They use their phones in places where they don't usually spend time.
  • When they go to places where they usually spend time, they don't take their phones there.
  • Voice recognition technologies are not exceeding our expectations.

If all of the above conditions for a prepaid smartphone are met, you can try to hide the connection between the two parties by making encrypted calls. But to do this effectively requires even more care and attention, in part because smartphones and secure data sharing apps require account registration. There's little point in using an "undetectable" phone to access services that are already tied to your identity. You can create anonymous email accounts and “one-time” accounts in other services, but this takes time and requires concentration. Both parties must understand what IP addresses are, browser fingerprints, how to use Tor Browser or Tails, and this is only part of what is needed. They will have to spend extra time and money for randomly selected Internet cafes without using real phones.

Listening

The phone can be configured to store or transmit data received from a microphone, camera or GPS receiver - and the owner will not know about it (applies to both a simple mobile phone and a smartphone). Most of these attacks are to blame malware, but it cannot be ruled out that telecom operators may be involved in such surveillance of devices connected to their networks. Some phones can even be turned on remotely and made to spy on their owners, although they will appear to be turned off.

    If you don't trust the person, don't give them access to your phone. (Violation of this rule is common reason how malware gets onto our devices).

    Please note: Using a mobile phone in public or in a place that you believe may be under surveillance makes you vulnerable to traditional eavesdropping techniques. In addition, the risk of your phone being stolen increases.

    Encourage those with whom you communicate on important issues to start using the same programs and techniques that you use yourself.

    Having a private, personal meeting? Turn off the phone, remove the battery. So as not to reveal place meeting, it is better to do this before you go to the meeting. If you can't disconnect the battery, just leave the phone somewhere safe.

Internet via mobile phone

The user ID in Signal is (for simplicity) your mobile phone number. Unfortunately, this means that without current number mobile Signal phone You won't be able to use it even if you prefer wi-fi. Additionally, if you want to contact someone on Signal, you'll have to give that person your phone number. Those for whom this is a problem can pay attention to other messengers with a “good reputation”, for example, Wire(Android, iOS).

Answers to the following questions will help you choose a mobile messenger:

  • What do digital security experts say about it?
  • Is this a free program? Open source?
  • Does it support end-to-end encryption between two users?
  • Does it support end-to-end encryption in group text chat?
  • Does it support end-to-end encryption for group voice communications?
  • Does end-to-end encryption protect transferred files?
  • Is it possible to set messages to "self-destruct after reading"?
  • Will the program work on a slow Internet connection?
  • Who is the developer of the application, should you trust him?
  • Who is the owner of the server, what is its policy regarding the storage of calls and messages?
  • Can you use one account on multiple devices?
  • Are all major operating systems supported?
  • Can I use it for registration? email address and a username rather than a phone number (which will keep your account and your real identity separate)?
  • Is it possible to use the messenger without giving it access to the contacts on the device?
  • Can it be used on a mobile device but not on a phone?
  • Can you (or someone you trust) run own server and communicate through it?

Sending and receiving email on a smartphone

Are you going to read important email on your mobile device? Make sure encryption is turned on, as discussed in Android Security Basics. (IN latest models iPhone encryption is enabled by default, it is only important to choose a strong password). This will not protect your mail all the way to the recipient, but it will prevent someone who tries to read it after losing/stolen a mobile device. You may find this guide helpful on how to keep your communications private.

In this guide we're talking about, in particular, about GPG-encryption Email on Windows, Mac and Linux computers. It is also possible to send and receive encrypted mail on Android devices, but not without difficulties. (There is currently no free GPG encryption for iOS).

Most security experts advise against storing your secret encryption key anywhere other than your main work computer. (Moreover, do not carry the key with you). However, you will need this key to read encrypted messages on your mobile device. Today devices Android is safer what they once were, and yours The secret key protected by a strong password. Thus, if you really necessary send and receive such important data on your Android device, and the transition to secure messenger you are not satisfied, you can install GPG on it.

To do this you need:

  1. Install and configure GPG and a key management application, for example, OpenKeychain .
  2. Copy your secret key to your device.
  3. Install and configure an email application that works with OpenKeychain, For example, K-9 Mail .

Not just calls and messages

Mobile phones are multifunctional devices, small computers with their own operating systems and downloadable applications. Mobile phones provide a variety of services. Much of what you do on a computer you can do on a smartphone today. And, of course, there are many things that you can do on a smartphone, but not on a computer.

Browsing Websites

Even the most basic mobile phones can't connect to the internet, but those are rare these days. If you use a browser on an Android device to visit, among other things, sites with limited access, take a closer look at using virtual private network(VPN) or application Orbot(Android versions of Tor Browser).

VPN on Android device

A VPN creates an encrypted tunnel from your device to a VPN server somewhere on the internet. VPN helps protect outgoing and incoming traffic. This is especially important if traffic passes through an insecure local or national network. However, since all traffic goes through the VPN provider, he can see everything that has now become unavailable for viewing from local network or Internet access provider. It's important to choose a VPN service you trust and remember to use HTTPS when transferring valuable data.

In some VPN countries illegal or have limited access. Find out what the situation is in the country where you plan to use the VPN. Remember that a VPN does not hide the fact that you are using a VPN.

To use a VPN, you will need to install a client application and create an account with VPN provider. Riseup Team offers a free, open-source VPN client for Android called Bitmask and supports free VPN service Riseup Black. (If you already have a Riseup Red account and know how to manually set up a VPN, you can use the app OpenVPN for Android(Play Store, F-Droid) with your username and password Riseup Red. (Application OpenVPN for Android free and open source).

Tor on an Android device

To have anonymous access to sites, you can use a couple of Android applications: Orbot And Orfox. Orbot routes Internet traffic through an anonymous Tor network. Orfox- mobile version Firefox, which uses Orbot and provides additional protection for your privacy. Together, these two apps allow you to bypass online filters and visit websites anonymously, the same thing that gives Tor Browser for Windows, Mac and Linux.

You can learn more about anonymity and censorship circumvention in the corresponding guide.

Photo and recording

Smartphones allow you to take photos, record sound, and shoot video. All this powerful tools to document events and disseminate information about them. The privacy and safety of those appearing on camera and in the recording must be respected. For example, if you recorded an important event, and then the phone fell into the wrong hands, this could lead to trouble for both you and the subjects of your report. Some tips on what to do to manage such risks:

  • Think about how you can securely and quickly upload recorded files online and delete them from your device.
  • Use tools to blur the faces of people in your photos and videos, and distort the voices of those you record.
  • Find out which programs and settings you can use to get rid of metadata in media files. Examples of such metadata are the GPS coordinates of the places where the photographs were taken, the parameters of the camera that was used to take the photo.

The Guardian Project developers created and maintain free application open source called ObscuraCam, which works with photos and videos: blurs faces and removes metadata.

if you necessary save faces, voices and metadata, then it is especially important that your device is encrypted. Files that you copy from the device to somewhere else for storage or transfer should also be encrypted. Driven by this idea, programmers Guardian Project developed the Proof Mode application, antipode ObscuraCam. Proof Mode“pulls out” maximum metadata from the material, which can help establish the authenticity of an image or video. This metadata is stored separately from the corresponding images and videos; transmit them only through secure channels.

  • Connect your phone to your computer only if you are sure that there is no malicious code on the computer. For more information, see our guide to protecting your computer from viruses and phishing.
  • Just like with a computer, be careful when connecting to wi-fi networks without password.
  • Turn off Wi-Fi, Bluetooth, and Near Field Communication (NFC) when not using these features. Enable them only when necessary and only to connect to trusted networks and devices. Whenever possible, use a cable to transfer data.
  • from The Intercept
, each of us hopes that it will last as long as possible.

However, by making a number of serious mistakes in its operation, we are slowly killing even the best gadget.

But if you follow simple rules, you can extend the life of your smartphone.

Read also:At what age should you give your child a smartphone and is it necessary to do it at all?

Here are 11 mistakes in using a smartphone that lead to its rapid failure.

How to extend the life of your smartphone

1. You never turn off your smartphone

It is necessary to completely turn off your phone at least once a week.

Otherwise, your smartphone battery will die sooner than you expect. According to experts, when the phone works non-stop, the battery runs out many times faster than if the battery is allowed to rest at least sometimes.

Also, stop using your phone as an alarm clock. A regular alarm clock is best suited for these purposes. He will wake you up every morning.

This way you will extend the life of your smartphone.

If you do need to use your phone's alarm, try to do it as little as possible and then turn it off during the day.

2. Leave Bluetooth and Wi-Fi always on



If you don't use any apps on your smartphone, then what's the point of leaving them enabled? For example, is it vital that your gadget supports WiFi and Bluetooth when you're walking around the city or chatting with friends?

No? Then it’s best to turn them off and turn them on if necessary.

This way you will reduce the loss of charge, and the performance of the smartphone will increase.

Disabling unnecessary functions, you will save energy and extend the life of your phone.

How to extend the life of your phone

3. You use your phone on the street in bad weather. weather conditions



Your smartphone is not designed to withstand ultra-high or ultra-low temperatures, so using it in extreme temperatures is not recommended.

This may result in the battery being discharged or the device being completely damaged. Also, if your phone isn't waterproof, you shouldn't use it in the rain or snow.

If you know in advance that you will be in extreme weather conditions, try to at least keep your smartphone in your pocket and use it only when necessary.

Phone charging errors

4. Leaving your phone to charge overnight



It may be quite convenient to charge your smartphone at night while you sleep.

But experts say this is not a good idea.

If your phone is already fully charged but is still charging, it can harm the battery over time and it will begin to drain quickly.

Please note that you do not need to charge your smartphone to 100 percent charge, as is commonly believed. Your phone's battery will thank you if you take it off before it reaches 100 percent.

*Try unplugging your phone when the battery is approximately 95-97 percent charged.

Try to charge it during the day rather than at night so you can turn it off when it's almost fully charged or set a timer.

5. You wait until the phone is discharged to 0 percent, and then charge it to 100 percent.



Lithium-ion batteries, which are used in some smartphones, work best when charged between 50 and 80 percent.

So says Shane Broesky, founder of Farbe Technik, a company that produces charging accessories.

When the battery is completely discharged, the phone goes into a "state deep discharge"This causes the ions to become unable to hold a charge.

Experts say that partially recharging the phone gives the battery enough energy to operate continuously and protect the battery.

In other words, recharging your battery is very similar to snacking between meals during the day.

6. Using a non-native smartphone charger



Many people use a non-original charger for their smartphones. Very often, original cords quickly wear out, fray and break. Therefore, we often have to buy new chargers.

However, they are the ones who can ruin the phone. This is especially true for iPhone chargers. The chargers from this brand are quite expensive, but they are worth the investment.

Using chargers from other manufacturers may damage your phone.

It is also reported that fake charging device can also cause fires and even explosions.

Apple appealed to people to hand over counterfeit chargers and purchase only original products at a discount.

7. Never clean your smartphone



Your smartphone carries a huge amount of bacteria.

By comparison, toilet seats and pet food utensils contain fewer germs per square centimeter than your phone.

There are also devices that use ultraviolet rays to disinfect your phone. Also, don't forget about your phone's charging port! This is where the most debris accumulates, which can cause your phone to malfunction.

Lint and various debris from pockets or wallets get stuck there and, accumulating, lead to serious connection failures over time.

Therefore, try to ensure that the port is always clean.

Clean it using a toothpick, a thin needle, or even back earrings. However, try to do this as carefully as possible so as not to scratch or damage the device.

8. When walking down the street, always keep your phone in your hands



The demand for stolen mobile devices on the black market is skyrocketing.

According to statistics, about 40 percent of all stolen smartphonesThey are specifically for the iPhone. A person walking down the street with a phone in his hands is a potential target for a thief.

Therefore, for your own safety, try to place your phone away from prying eyes. Use outside the home mobile device only when necessary.

It's important to keep your smartphone secure for many reasons. You can store data on it and if your phone is lost or stolen, it will be lost. Or perhaps yours personal information can be hacked from the Internet pages you visited, as well as from the smartphone itself. We've put together some tips to help keep your device as safe as possible.

Use a screen lock

Many new phones offer a "pattern lock" - a personalized shape or pattern that is drawn on the screen to grant access. However, make sure that the screen is cleaned regularly. If your phone is stolen or lost, fingerprints can sometimes be visible and accessible on the screen. Alternatively, a PIN offers an alternative and can also save time. Make your password difficult to crack but unforgettable for you. The best tip for creating secure passwords is to take the initial letters of a line in a song, game, or book and create a password from those letters.

Use a SIM card lock.

A screen lock is useful, but it won't stop someone from removing the SIM card from your phone and using it on another phone. To prevent this from happening, set up a SIM card lock in the form of a PIN code that you must enter when your phone is turned on to connect to the network.

Protecting confidential data

While PIN entry and password locks are useful, a smartphone is a miniature computer with often easily removable storage. It's too easy to get data by simply plugging it into your computer or removing the microSD card.

It is important to protect sensitive data stored in internal storage. Available software, which can encrypt files or folders so that a code is entered before the file can be viewed or copied. Many of these programs are free to download and use and can work effectively with your phone to provide automatic protection, so there's little hassle to get up and running.

Wireless protection

Any device that can send data over broadcast channels, is a security issue.

Always turn off your wireless connection when not in use. This ensures that people cannot connect to the device without your knowledge. It's also worth checking your phone network's security settings as it may be configured to automatic connection to the network when you are in range without knowing. Make sure your home access To wireless router password protected.

If you're using a mobile wireless or hotspot, be wary of malicious connections that look a lot like a legitimate big company hotspot.

Protect your bluetooth use.

Bluetooth is not generally considered a risk because it has a relative range of shots (10 meters). However, hackers are known to have remote access to the phone if they are in range.

Make sure Bluetooth is turned off when not in use. Set your Bluetooth configuration to "undiscoverable" to prevent users who were looking for nearby devices from seeing yours.

Any unknown requests that appear over a Bluetooth connection, such as a prompt to “connect to a device,” should be ignored or rejected. A hacker in range could use your device via Bluetooth if it is not secured.

Application download security

Unfortunately, the increase in malware associated with smartphones has increased the need to be careful when downloading applications and pay attention to the requirements that any software requires during installation. It's very easy to not read anything when trying to run an application, but be careful with any access requirements various functions your phone, especially if the application is not known.

Internet browsing

Be careful when accessing the web browser on your smartphone, as it may be easy to accept messages that appear. For example, agreeing to save user information and passwords may make it easier to remember later, but unfortunately, others may do the same if they gain access to your phone.

If a security warning appears while browsing a website, please note it and, if necessary, exit the website. Also, make sure that any banking or trading site where you post secure information has a padlock on it. address bar to ensure that the site is encrypted. More information about online shopping can be found in our guide.

Disable geotagging

Anyone with the right software can look at your Facebook or Flickr photos and see where you were and where you were right at that moment. The geotagging feature can be turned off on most phones, giving you privacy and ensuring you can't find someone you might not want to find.

Install antivirus

The capabilities of smartphones are approaching those of PCs, but most people have no protection even though they may face similar threats.

Many antivirus companies now offer free versions of their commercial mobile products, as well as multi-PC and phone protection for an annual subscription.

Unfortunately, fake antivirus software designed to infect your device or trick you into thinking it's protected when it isn't has also now made its way to smartphones, so be vigilant.

Remote wipe

If the worst happens and your phone is lost or stolen, you can protect your data by quickly and remotely wiping it. Many operating systems have a number of third-party specialized applications remote wipe for selection. These tend to be subscription services, but prices are typically less than £5 per month.

Additionally, there are other features offered by antivirus packages. Free versions, such as AVG's Mobilation Free, offer topical cleaning products. However, it is not always clear whether remote cleaning or simply local system cleaning, so check your software provider before purchasing.







2024 gtavrl.ru.