Home - mobile-devices
Encrypt your Device
Essential
In order to keep your data safe from physical access, use file encryption. This will mean if your device is lost or stolen, no one will have access to your data.
Turn off connectivity features that aren’t being used
Essential
When you're not using WiFi, Bluetooth, NFC etc, turn those features off. There are several common threats that utilise these features.
Keep app count to a minimum
Essential
Uninstall apps that you don’t need or use regularly. As apps often run in the background, slowing your device down, but also collecting data.
App Permissions
Essential
Don’t grant apps permissions that they don’t need. For Android, [Bouncer](https://awesome-privacy.xyz/security-tools/mobile-apps/bouncer) is an app that allows you to grant temporary/ 1-off permissions.
Only install Apps from official source
Essential
Applications on Apple App Store and Google Play Store are scanned and cryptographically signed, making them less likely to be malicious.
Be Careful of Phone Charging Threats
Optional
Juice Jacking is when hackers use public charging stations to install malware on your smartphone or tablet through a compromised USB port.
Set up a mobile carrier PIN
Essential
SIM hijacking is when a hacker is able to get your mobile number transferred to their sim. The easiest way to protect against this is to set up a PIN through your mobile provider.
Opt-out of Caller ID Listings
Optional
To keep your details private, you can unlist your number from caller ID apps like TrueCaller, CallApp, SyncMe, and Hiya.
Use Offline Maps
Optional
Consider using an offline maps app, such as OsmAnd or Organic Maps, to reduce data leaks from map apps.
Opt-out of personalized ads
Optional
You can slightly reduce the amount of data collected by opting-out of seeing personalized ads.
Erase after too many login attempts
Optional
To protect against an attacker brute forcing your pin, set your device to erase after too many failed login attempts.
Monitor Trackers
Optional
[εxodus](https://awesome-privacy.xyz/security-tools/online-tools/εxodus) is a great service which lets you search for any app and see which trackers are embedded in it.
Use a Mobile Firewall
Optional
To prevent applications from leaking privacy-sensitive data, you can install a firewall app.
Reduce Background Activity
Optional
For Android, SuperFreeze makes it possible to entirely freeze all background activities on a per-app basis.
Sandbox Mobile Apps
Optional
Prevent permission-hungry apps from accessing your private data with [Island](https://awesome-privacy.xyz/security-tools/mobile-apps/island), a sandbox environment.
Tor Traffic
Advanced
[Orbot](https://awesome-privacy.xyz/security-tools/mobile-apps/orbot) provides a system-wide Tor connection, which will help protect you from surveillance and public WiFi threats.
Avoid Custom Virtual Keyboards
Optional
It is recommended to stick with your device's stock keyboard. If you choose to use a third-party keyboard app, ensure it is reputable.
Restart Device Regularly
Optional
Restarting your phone at least once a week will clear the app state cached in memory and may run more smoothly after a restart.
Avoid SMS
Optional
SMS should not be used to receive 2FA codes or for communication, instead use an encrypted messaging app, such as [Signal](https://awesome-privacy.xyz/communication/encrypted-messaging/signal).
Keep your Number Private
Optional
[MySudo](https://awesome-privacy.xyz/finance/virtual-credit-cards/mysudo) allows you to create and use virtual phone numbers for different people or groups. This is great for compartmentalisation.
Watch out for Stalkerware
Optional
Stalkerware is malware that is installed directly onto your device by someone you know. The best way to get rid of it is through a factory reset.
Favor the Browser, over Dedicated App
Optional
Where possible, consider using a secure browser to access sites, rather than installing dedicated applications.
Consider running a custom ROM (Android)
Advanced
If you're concerned about your device manufacturer collecting too much personal information, consider a privacy-focused custom ROM.