Security Essentials

 Last reviewed on January 29, 2026
 Takes about 45 minutes

Every click, message, and location ping creates a digital trail that can be used against activists and organizers. Law enforcement regularly demands data from tech companies to identify and surveil people working for social change.

This guide helps you minimize your digital trail. These steps won't make you invisible, but they'll make it substantially harder for authorities to:

  • Track your location and movement patterns

  • Monitor your communications and political discussions

  • Map your relationships and networks

  • Build profiles of your activities and associations

Baseline protections

everyone

This section is for anyone doing activism or advocacy work.

Use Signal for encrypted texts and calls, especially your activism and political conversations

Normal calls and texts are not private and can be easily surveilled and turned over to law enforcement

DO: Use Signal
DO NOT: Use Facebook Messenger, Telegram, regular texts, etc. (Avoid WhatsApp if possible)

Most normal texts and calls can be observed by your cell phone provider and the government. Telegram is incredibly insecure. (See below for our thoughts on WhatsApp.)

Signal is the best option to keep your messages secure and to keep who you are talking to private.

How to set up Signal

  1. Install Signal on your phone.

  2. You can now message your existing contacts using their phone number (they must have Signal installed as well). If you're messaging someone new who you don't yet have trust with, you should exchange usernames instead of phone numbers when possible.

  3. To start a new message: Press the "Create" icon in the top right of Signal, then type in either the person's phone number or username

  4. Enable disappearing messages by default: Signal > Profile picture > Settings > Privacy > Disappearing Messages > Set to your desired time.

  5. Follow the Signal Security Checklist to make sure you have the most security and privacy

When to use Signal

Some examples of when you would especially want to use Signal

  • Discussing a protest/action that is not public

  • Organizing a protest/action that is public, but the organizers want to protect their privacy

  • Criticizing the government or other power-holders

What about WhatsApp? (Avoid it if you can, use it if you must)

WhatsApp messages are secured with the encryption method developed by Signal, so the contents of your messages are secure. However, Meta harvests a lot of information about who you are talking to, how often, and what groups you're in. In 2024 alone, they turned over data for 78% of government requests. Your messages are safe, but who you are communciating with is not. It is an option to consider if the community you're working with is unlikely to move to Signal. It is safer than normal texts, Telegram, etc. If you do use WhatsApp, make sure to use the new Strict Account Settings feature and lock down your privacy settings

ImportantChange your default settings so all new Signal threads have disappearing messaged enabled

This keeps everyone safer if someone's phone is ever confiscated or breached.

The best upgrade everyone can make to their use of Signal is to make sure that disappearing messages are enabled by default. Most activists we talk to haven't enabled this by default. (And most people forget to enable it manually for each new thread.)

This keeps you safe and other people safe. We don't know who's phone will be seized by law enforcement. Even if we believe we're talking about perfectly legal things, the government can find ways to twist our words to attempt to make a case against us for our dissent

There are two things to track related to disappearing messages:

  1. First, change your default so any thread you make has this feature enabled.

  2. Second, make sure it is enabled for threads that other people start: if someone else starts the thread, it may not have disappearing messages enabled. You may need to enable it.

How to enable disappearing messages

  1. To change the default: Signal > Profile picture > Settings > Privacy > Disappearing Messages > Set to your desired time (longer or shorter depending on your risk tolerance).

  2. (Android-only) Change your message retention limit: This will delete messages on threads even that don't have disappearing messages turned on. (They will only be deleted on your device.) Signal > Profile picture > Data and storage > Manage storage > Keep Messages > Set to your desired max timeframe. Go back a screen and enable "Apply limits to linked devices".

  3. To change existing threads: Signal > Open the message thread you want to change > Click on the person's name (or group name) at the top of the screen > Disappearing Messages > Set to your desired time

  4. Delete old messages/threads: Disappearing messages does NOT apply retroactively. So you may want to delete old threads on your phone. This will not delete them on other people's phones, unfortunately. So if it is very sensitive, you may need to ask them to also manually delete the thread. (And while you're at it, encourage them to turn on disappearing messages by default!)

Choosing your disappearing message time: How long you set your disappearing times depends on the sensitivity of your messages. A question you might ask yourself is "if someone's device was confiscated or hacked, how important is it that these messages are not accessible?"

  • For chatting about low-risk things with friends, you might choose 4 weeks.

  • For standard political organizing, you might choose 1 week.

  • For a direct action, you might set it to 1 day or 1 hour or 5 minutes, so the messages are gone before the action starts.

Use privacy-focused browser for everyday browsing (instead of Chrome)

Minimize tracking, so there’s less of a digital trail.

DO: Use Brave Browser (easiest) or Firefox (more setup required)
DO NOT: Use Google Chrome, Microsoft Edge, etc.

We recommend Brave because it offers the most privacy without any additional configuration, which is our goal on this site.

Bonus Brave configuration tips:

Other browser options:

How to set up Brave Browser

Brave is a privacy-focused browser that allows you to install Google Chrome extensions.

  1. Install Brave on your computer (or phone).

  2. Follow the steps after you launch to import your configuration from Chrome or another browser. (See warning below about how plugins make you more identifiable.)

  3. Configure privacy settings: On the desktop browser, go to Brave > Settings > Shields then select the following: (The mobile app will not have all these settings)

    • Select Aggressive under "Trackers & ads blocking"

    • Select Strict under "Upgrade connections to HTTPS"

    • Uncheck everything under Social media blocking

    • (Optional) Enable Forget me when I close this site. (On the mobile app, the settings is called "Shred Site Data") The site won't be able to store anything about you after your reset your browser.

      This will make it harder for sites to track you across the internet. It's good for privacy, but you'll want to manually override this for specific sites. Visit the site > Click the Brave (lion) logo in the URL bar > Advanced controls > Disable "Forget me when I close this site"

Optional:

  1. Disable the annoying new tab page: Brave > Settings > Get started > New Tab Page > Select "Blank page" from the dropdown

  2. Disable toolbar items: Brave > Settings > Appearance > Toolbar > Disable all the toolbar buttons that you don't want (Brave Rewards, VPN, Wallet, Leo AI, etc)

Install the latest software updates for your laptop, phone, and apps

The latest updates for your computer, phone, and apps all contain security fixes that help keep your system safe from attackers.

DO: Run updates as soon as they are offered
DO NOT: Keep pressing the “update later” button

All software contains bugs, which are errors or flaws that can lead to various issues.

How to run updates

iPhone

  1. Verify your device is still supported: Check for iPhone models. Make sure there is a "Yes" in the "Supported" column.

  2. Operating System: Settings → General → Software Update

  3. Apps should already be automatically updated unless you have disabled this option.

Mac

  1. Verify your device is still supported: Make sure your Mac isn't on this "obsolete" list. You can check your Mac model by going to the Apple menu → About This Mac.

  2. Operating System: Apple menu → System Preferences → Software Update

  3. Apps installed via the Mac App Store: These apps should already be automatically updated unless you have disabled this option.

  4. Other apps: Check for updates by going to the top menu bar → Click on the app name → Click either "Check for updates" or "About [APP NAME]" or look inside "Settings...". If you don't see an option to update, it may be set to automatically update in the background.

Android

  1. Verify your device is still supported: Checking Samsung models or Google Pixel models depending on your manufacturer. Make sure there is a "Yes" in the "Security Updates" column.

  2. Operating System: Settings → System → System Update (may vary by manufacturer)

  3. Apps should already be automatically updated unless you have disabled this option.

Windows

  1. Update your system: Start → Settings → Update & Security → Windows Update

  2. Verify your device is still supported: After attempting an update, you should be able to see your current operating system version number. Check that version number against this list of Windows versions that are still receiving security updates.

  3. Microsoft Store apps: Make sure you enable automatic updates (on by default).

  4. Other apps: Look for updates in the menu bar under Help > Check for Updates, or search for "Updates" or "About" in the app's settings.

Ditch Google Search and use a search engine like Brave Search instead

Your search history tells a lot about your interests and political leanings.

DO: Use a privacy-respecting search engine like Brave Search or DuckDuckGo.
DO NOT: Use Google Search, Bing, Yahoo, etc.
  • Brave Search tends to have better results and we trust them, but some folks don't align with their business model

  • DuckDuckGo results aren't as reliable but it has a slightly stronger privacy record.

How to set up private search

Use a privacy-focused map/navigation app (Apple Maps or Magic Earth)

Protect yourself from Google turning over your data to law enforcement

DO: Use Apple Maps (iPhone-only) or Magic Earth (free)
DO NOT: Use Google Maps

Your location history reveals a lot about your interests, friends, and political activity. It can also be used against you in court.

Your phone is always revealing your approximate location to your cell provider because it knows what cell tower you are connected to. But any app you give your exact GPS location to has much more detail.

You can protect yourself by using a mapping app that is more privacy-preservating.

Apple Maps (iPhone only) offers privacy protections that are stronger than you might expect and is much more private than Google. However, as a big tech company, it's best for everyday use rather than sensitive organizing. We recommend it because it provides live traffic and public transportation features that privacy-focused alternatives lack.

How to set up Apple Maps (iPhone only)

  1. Apple Maps is installed by default (you can re-install it if you removed it).

  2. Go to Settings > Privacy & Security > Location Services > System Services, then disable iPhone Analytics, Routing & Traffic, and Improve Maps.

Magic Earth (iPhone or Android; free) offers strong privacy. It is much easier to use than our other cross-platform suggestion (CoMaps). Some features are only available in the paid version, though.

How to set up Magic Earth (iPhone or Android)

  1. Install Magic Earth (free; paid for live traffic)

  2. It functions mostly like Google Maps or Apple Maps!

CoMaps (iPhone or Android; free) is a less user-friendly than Magic Earth or Apple Maps, but has the strongest privacy promises. You can operate it entirely offline, which is especially helpful for activists doing sensitive work. That said, it doesn't have live traffic data or public transit routes, which makes it hard to use as your main navigation app.

Revoke location permissions from individual apps that don't need it (which is most of them)

Protect yourself from apps with location access giving the government or data brokers a detailed log of your movements

DO: Turn off location tracking for most apps
DO NOT: Let every app know where you are

How to review location permissions on iPhone

  1. Go to Settings > Privacy & Security > Location Services

  2. Review each app and set to one of these options:

    • Never: Best choice for most apps

    • Ask Next Time Or When I Share: Good for apps you rarely need location for

    • While Using the App: Only for essential navigation apps

    • Always: Almost no app should have this permission

  3. Make sure to set the Camera app to “Never” so you don’t risk revealing your location when you share or upload photos.

  4. Go to the app labeled System Services > Disable Significant Locations

How to review location permissions on Android

  1. Go to Settings > Privacy > Permission manager > Location

  2. Review each app and set to one of these options:

    • Don't allow: Best choice for most apps

    • Ask every time: Good for apps you rarely need location for

    • Allow only while using the app: Only for essential navigation apps

    • Allow all the time: Almost no app should have this permission

These apps might genuinely need location while in use:

  • Navigation (Apple Maps, Magic Earth, CoMaps)

  • Ride-sharing (but only while actively using)

Some apps might need temporary permission:

  • Food delivery apps only need location when you're actually ordering

Apps that definitely do NOT need location access:

  • Photo apps

  • Social media apps

  • Games

  • Most shopping apps

  • Banking apps

  • News apps

  • Most productivity apps

Remember: Every app with location access is a potential privacy leak. When in doubt, disable location and only re-enable if you find you actually need it.

Protect yourself from doxxing (online harassment) by removing yourself from "people search" sites

Your home address and phone number are very likely already exposed on dozens of websites.

"People search" sites collect and publish profiles on all of us including our name, addresses, phone numbers, profile photos, email addresses, and social media accounts. The checklist linked below shows you how to remove yourself

Doxxing is an increasingly common tactic used against activists where a bad actor posts your email/phone/address/etc with an intent to get others to harass you online and sometimes in-person.

How to protect yourself against doxxing

  1. Start by completing the first three items on our Doxxing Defense checklist.

  2. After that, start working through the rest of our that checklist.

Use a password manager with strong passwords

When you use the same password on multiple sites and one site gets hacked, a hacker can gain access to many other accounts. If you use a weak password, the cops will have an easier time targeting you.

DO: We recommend 1Password ($3/month) or Bitwarden (free)
DO NOT: Use weak/identical/similar passwords. We don’t recommend using LastPass.

Our main recommendations are:

  • 1Password: Very user friendly. Slightly more secure. Costs $3/month

  • Bitwarden: Free. Still quite secure.

How to set up 1Password

  1. Download: Download and install 1Password ($3/month)

  2. Master password: Create a strong, random "master password" using a passphrase generator. It should be memorable, but not a password you use anywhere else. Write your master password down on paper rather than storing it digitally. Set a reminder to destroy the paper in a few weeks once you have it memorized.

  3. Import: Import your existing passwords from your computer or browser

  4. Apps: Install the browser extension and mobile app (iPhone, Android) to help you save and auto-fill passwords

  5. Change passwords: If you had been re-using similar passwords, update your most important ones using the random password generator built-in to 1Password.

See 1Password's getting started guide for a video of these steps.

Bonus: Here’s a good introduction on how to get the most out of 1Password.

Alternative options:

  • Proton Pass: has a free option

  • KeyPassXC: Open-source and allows you to store passwords only on your machine instead of the cloud, but the user interface is very clunky.

Enable two-factor authentication

If someone steals your password, two-factor authentication keeps them from being able to get in unless they have your phone too.

DO: Enable two-factor authentication for important sites
DO NOT: Use only a password

After entering your password, you'll need to enter a code from your phone to prove it's really you. Think of it like having both a key and an alarm code to get into your house—someone needs both to get in.

Your email is the most important account to have two-factor authentication. If an attacker gets access to your email, they can reset all your other passwords.

How to set up

Install an authenticator app:

  1. Option 1: 1Password: If you're using 1Password, it has an "authenticator" feature built-in (details here).

  2. Option 2: Ente Auth: Install Ente Auth (iPhone, Android)

    • Optional: You can create an account. Your data is end to end encrypted. Or you can not have an account, but you may lose your one time passwords if your phone is not backed up.

To set up two-factor authentication:

  1. Go to Security/Privacy settings

  2. Look for "2FA" or "two-factor authentication" or "multi-factor authentication"

  3. If an “authenticator app” option is available, select that! (Remember to save the backup codes somewhere secure, like your password manager.)

  4. If “text/SMS verification” is the only option, select that and follow the instructions.

  1. Links to set up 2FA on common sites:

Note: When a service allows you to choose between an authenticator app and SMS text message verification codes, opting for the authenticator app is always best. It’s possible for an attacker to intercept your SMS texts.

Set your phone passcode to 8 to 10 random digits

It takes years for cops to crack an 8-digit random passcode. They can probably guess your current passcode in less than 5 minutes with automated tools.

DO: Use a random passcode generator to create an 8 to 10-digit code
DO NOT: Use any passcode you thought of yourself (dates, patterns on the keyboard, etc.). Do not use 6-digit passcodes if possible.

How to change your passcode

  1. Generate a random 8 to 10-digit passcode using this random passcode generator. (Don't make one up yourself—humans are bad at choosing randomly!)

  2. Change your passcode:

    On iPhone: Settings > Face ID & Passcode > Change Passcode > Passcode Options > Custom Numeric Code

    On Android: Settings > Security > Screen Lock > Enter Current Lock > PIN/Password > Enter a Passcode

  3. Practice the new passcode at least 10 times in a row right now so are more likely to remember it. (Disabling biometrics will force a passcode request every time you lock the phone.)

  4. Write your new passcode on paper and keep it somewhere safe at home until you've memorized it. Then destroy it after 2–3 weeks. Setting a reminder on your phone can help.

How long does it take to crack a passcode?

Type
Time it takes to crack (average)
Example
6-digit easy-to-guess pattern
Less than 24 hours to crack
333666 (common pattern)
110585 (date pattern for Nov 5, 1982)
6-digit random code
200 days to crack
238253
8-digit random code
40+ years to crack
34780026

Note: These times only apply to phones. Computers can be cracked much more quickly, and need much stronger passwords.

Sources: The estimates in the table above assume real-world observed attempts/second from police forensic hacking tools. If you need more security, use a 10-digit passcode, which will protect you even under the highest-possible cracking scenarios. See the sources linked in the passcode FAQ here.

Disable Advertising ID (which can let cops track your location)

Law enforcement uses tools rely on your advertising ID to track you

We know that ICE and other law enforcement agencies are using location tracking tools that partially rely on the "advertising ID" that your phone provides. They are often using these to suppress dissent.

iPhones have this feature disabled by default. Androids have it enabled by default.

How to disable advertising ID

  • iPhone: By default, iPhones already have this setting disabled. So unless you turned it on, you're good to. Settings > Privacy & Security > Tracking > Disable app tracking

  • Android: This setting is different on different phones, so searching is easiest. Settings > Click the search icon and search for "ads" or "advertising" > Tap Delete advertising ID

Use Proton Docs and Mail for activism instead of Google Docs and Gmail

Protect yourself and your community from government data demands that you don't know about.

DO NOT: Use Google Docs and Gmail for activism communications

Tech companies (like Google) often receive government demands to turn over all the account data for an activist. This often includes a "gag order" which means the company can't tell the user until months or years later.

Encrypted cloud tools like Proton Mail, Drive, Docs, and Sheets ensure the company doesn't hold readable copies of your data to hand over. If the government wants it, they'd need to demand it from you—giving you notice and the opportunity to challenge it with legal support.

How to set up and use Proton Docs and Proton Mail

Create a Proton account

  1. Sign up for a free Proton account.

  2. Verify: When asked to verify if you are a human, choose the “CAPTCHA” option rather than the “email” option, so you don't link your true identity.

  3. When asked to set your phone number / email as a recovery method, choose Maybe later.

Use Proton Drive/Docs/Sheets

  • Create and edit documents collaborative much like Google Docs. Someone must have a Proton account to be shared directly.

  • Share securely: Only use "share by link" when necessary, set a document password, set the "public link" to have an expiration date.

Use Proton Mail

  • Use Proton Mail for: website accounts, newsletters, public-facing communications needing anonymity, and non-sensitive organizing work.

  • Don't use any email for: truly sensitive communications that might put someone at legal risk.

  • What gets encrypted vs not: Messages between Proton Mail users are automatically end-to-end encrypted. Messages to people using a different email provider will not be encrypted, but you can send a password-protected email.

CryptPad is another popular encrypted doc option, but it very difficult to use. If it has features you need, it accomplishes the same result.

Enhanced protections

medium-threat

This section is for you if you are in a leadership role or you are doing activism that is more likely be targetted by the state or your opposition.

Install a trusted VPN with ad-blocking to make it harder for cops to do warantless survillance

A VPN makes it harder for websites to track you and prevents your internet provider from logging your traffic.

DO: Install a trust VPN and keep it on. We recommend Mullvad VPN ($5/mo) or IVPN ($6/mo).
DO NOT: Use a random VPN you find online. Nord VPN, Surfshark, ExpressVPN, etc. are popular but not trustworthy.

Anytime you connect to the internet (phone or computer), your internet provider is revealing your approximate location to every site/app you use.

We know that law enforcement agencies are using tools that to track your location using data gathered from apps you have and ads you see. Using a VPN with ad-blocking features enabled makes it much harder for them to track you. Also, police can get a subpoena for your internet traffic from your internet provider.

A VPN (Virtual Private Network) helps mask your location and makes you slightly harder to identify.

A VPN with ad-blocking enabled is especially important on your phone.

Options: All of these are very trustworthy options.

  • Mullvad VPN (top recommendation) -Better privacy since payment info isn't stored, but you need to manually pay each cycle.

  • IVPN can be easier because it automatically renews.

  • Proton VPN has a solid free plan, but it is only for 1 device. To get ad-blocking, you need a paid plan. (See our note regarding concerns about the Proton CEO and why we still offer Proton options.)

How to set up Mullvad VPN

Mobile app

  1. Create an account number and write it down: Create a Mullvad account number (there is no password) and write it down somewhere safe like your password manager.

  2. Pay (aka "Add time"): There is no automatic renewal, so all payments are manual. Paying yearly can make things easier so you don't have to remember.

  3. Install the Mullvad mobile app (iPhone, Android) and use your Account number to sign in.

  4. Enable ad-blocking: Gear Icon ⚙️ > VPN Settings > DNS Settings > DNS content blockers > Enable Ads, Trackers, and (optionally) Malware

Desktop app

  1. Install the Mullvad desktop app (Mac, Windows). Get the Account Number from the phone app.

  2. Enable autoconnect: Find Mullvad in your toolbar > Gear Icon ⚙️ > VPN Settings > Enable "Launch app on start-up" and "Auto-connect"

  3. Enabled ad-blocking: Find Mullvad in your toolbar > Gear Icon ⚙️ > VPN Settings > DNS content blockers > Enable Ads, Trackers, and (optionally) Malware

We recommend keeping your VPN on at all times unless you're having trouble connecting to a site (see below).

Note: Instead of a credit card, you can also order a voucher card for Mullvad or IVPN so that your identity is even more protected. (Yes, we hate Amazon too, but that's the only place online you can buy these cards.)

Downsides to using a VPN

  • You will encounter more CAPTCHAs on websites

  • Some websites may block VPN access, and you'll have to disable it and remember to re-enable it later

  • Some streaming services might not work

If you experience odd behavior on websites, always try turning off the VPN temporarily to see if it will load.

Note: You must use a trusted VPN that doesn't keep logs of your internet traffic and will push back on government requests. We've vetted our top recommendations.

Remove smart home speakers from your home (Alexa, Google Home, etc)

If you're in a higher risk category, you should be conscious anytime you're talking about political activity around a microphone. This includes laptops, phones, smart watches, and smart speakers.

Risks: These devices have speakers that are always listening.

Protecting yourself: Removing smart speakers from your home is one easy step to take to reduce the likelihood of surveillance.

Most of us are not being actively surveilled most of the time, but it is safer to get into the habit of assuming you might be. Once you're used to it, it doesn't take much work.

How to remove smart speakers

  1. Just get rid of the smart speakers and anything that has a microphone and is internet-connected. Look for phrases like "voice control," "works with Alexa/Google Assistant," or "built-in assistant". This includes:

    • Amazon Alexa (Echo, Dot, etc)

    • Google Nest Speaker, Google Home

    • Sonos and other home speakers

    • Smart thermostats (some newer models have microphones and voice assistants built-in)

    • Smart TVs or streaming devices (Look into whether yours has a microphone built-in or not. If so, try to replace it.)

  2. If you need a speaker for music, search for something that doesn't include a microphone at all. Or a simple bluetooth portable speaker that might have a microphone, but isn't internet connected (and gets turned off when not in use).

If you're replacing a product, try to buy used to reduce e-waste and resource extraction.

Background:

Enable Lockdown Mode (iPhone) or Advanced Protection (Google & Android)

Mercenary spyware is an extremely advanced attack, exploiting sophisticated vulnerabilities on our devices. In response, Apple and Google have introduced an advanced security mode that offers enhanced protection against spyware.

On iPhones, it's called Lockdown Mode and on Android, it's called Advanced Protection Program. (You can also enable Advanced Protection Program on just your Google Account even if you don't have an Android phone.)

We have no reports of anyone getting infected with spyware who had Apple's Lockdown Mode enabled. Android's Advanced Protection is more recent and its effectiveness has yet to be tested.

How to enable Lockdown Mode for iPhones

iPhone: Settings Privacy & Security Lockdown Mode → Enable

Enabling Lockdown Mode introduces some usability tradeoffs on your phone. See list below.

This feature is available for iOS version 16 and above.

How to enable Advanced Protection on Android

Android: Settings Security & Privacy under "Other Settings" tap Advanced Protection.

Note: The location of this setting may vary between Android devices, so we recommend searching for 'Advanced Protection' in the Settings search bar.

This feature is available for Android 16 and above.

Usability trade-offs

For anyone worried about targeted attacks, these usability trade-offs will likely be worth the big increase in security.

iPhone Lockdown Mode: Features that will be harder to use

  • No clickable links in messages (mainly within iMessage) - Links show as raw URLs and don't work (i.e. are not instantly clickable). You have to copy-paste them manually to a browser. This encourages you to make sure they are safe before doing so, since spyware often arrives via a text message containing a custom-designed link that is impossible to ignore for you in particular.

  • Most message attachments blocked (also mainly within iMessage) - When receiving PDFs, documents, Office files, contacts, location over iMessage, you might not be able to view them normally and iMessage will indicate "1 attachment." This is because some spyware can be delivered through malicious attachments.

  • FaceTime calls from unknown contacts blocked - Lockdown Mode will block call attempts from unknown contacts or people you have not been in touch with in the last 30 days. You will be notified if this user attempts to FaceTime you and you can decide to call back if the call attempt is genuine.

  • Web fonts don't load - Websites appear with system fonts only, often looks weird.

  • Images may not display - Some images show as missing image icons.

  • Interactive webpage elements fail - Complex web features, animations, dynamic content often broken.

  • Location sharing is disabled in Find My. You can see other people's locations but they can't see yours.

  • iCloud Shared Albums don't work as expected - When you share photos in a shared album, location information is excluded. Shared Album invitations might be blocked too.

  • Device won't connect to any WiFi automatically - On Lockdown Mode your phone won't connect to insecure WiFi's automatically and you will need to manually connect to the chosen network and accept the security risk.

  • 2G or 3G support is turned off - If you find yourself in a location with 2G or 3G cellular network with Lockdown Mode, your phone will simply not connect (as 2G / 3G is more insecure than 4G / 5G).

Learn more about Apple's Lockdown Mode.

Google/Android Advanced Protection Program:

  • Security key required - Must use security key/passkey for every new device sign-in to Google Account, which can take some getting used to.

  • JavaScript optimizer disabled (Chrome) - Some complex websites may not work properly.

  • No sideloading - Can't install apps from outside Play Store or verified stores.

  • USB locked when device locked - Must unlock device before connecting USB accessories.

  • Insecure Wi-Fi blocked - Won't auto-connect to open/WEP Wi-Fi networks.

  • Enhanced Safe Browsing warnings - More download warnings and potential blocked websites.

  • Fast charging might not work as expected - You might need to unlock the phone in order to activate fast charging.

Learn more about Android Advanced Protection Program.

Follow our phone security checklist

How to secure your phone

For added privacy and security on your phone, follow as many of the steps in our Prepare for a Protest guide as you are able to in your daily life, even if you’re not at a protest/action.

Leave Signal groups that might put others at risk

This helps protect your network if your phone is confiscated.

If your phone is confiscated by law enforcement, one of the biggest risks is exposing your entire network. Even if people aren't using their real name on their Signal account, there is still a unique ID behind every Signal username. And the cops can use this to correlate someone's identity across many seized devices.

You need to both leave AND delete the group:

  • If you only leave the group, old messages stay on your phone as well as the history of who was in the group.

  • If you only delete the group, new messages will still come through and the thread re-appears.

How to leave AND delete a Signal group

  1. Make a plan to re-join afterwards: When headed into a situation with possible arrest, make a list on paper at home or somewhere safe of all the groups and who you need to message who can re-add you after the action or border-crossing is complete.

  2. To leave the group: Signal > [Group] > Tap the group icon at the top > Click “Leave group” at the bottom.

    • If you're the only admin, you have to either remove all members or assign another admin.

  3. To delete the group from your phone: Signal > Main screen > Swipe left on the thread > "Delete.”

    • This won't delete it for anyone else.

Security hygiene tips:

  • Set a recurring remind to clean up your Signal thread every 3 months.

  • Make sure you take note of which groups you are leaving and who you can ask to re-add you after the action.

Note: If you find this process very annoying and cumbersome (because it is!), that's another good reason to use a secondary phone for actions. That phone would only ever be in the one or two groups needed to pull of the action that day.

Don't click suspicious links

You can protect yourself against spyware by being cautious about what you click on

Spyware often arrives through a text or email with a link custom-designed to feel impossible-to-ignore specifically for you. These aren't random spam - they're personalized attacks that exploit what matters most to you.

How to catch and respond to suspicious links

When in doubt: Do not click the link!

  1. Instead, Contact the sender (whether a business or a friend) through a different method (call them, use a different app) to verify they actually sent it. Taking 2 minutes to verify is always better than clicking and compromising your device.

  2. If it is a shortened URL like bit.ly or tinyurl.com, you can use ExpandURL.net to view the destination page, but this provides no guarantee that the page isn't Spyware. It just helps you view the true URL so you can make a better assessment of whether you trust it.

Red flags to watch for:

  • Messages from numbers you don't recognize: We all get messages from services that aren't in our contact book often, so it can take work to discern whether this is a legitimate message or not. If it's someone not in your contact book, approach it with more caution.

  • Urgency or fear: "Your account will be locked," "Urgent security alert," "Family emergency"

  • Unfamiliar domain name: Spyware texts often come from weird domains like adsmetrics[.]co or

  • Too personal: References your activism, recent events you attended, or people you know - designed to bypass your critical thinking

  • Unexpected messages: A contact sends a link with no context, unusual phrasing, or at a strange time (their account may be compromised)

  • Shortened URLs: bit.ly, tinyurl.com, or other link shorteners that hide the real destination

  • Slight misspellings in the URL: goog1e.com instead of google.com

Spyware messages can be highly targeted. Here are some real-world examples of how Pegasus Spyware has been deployed:

"Dear Carmen my brother died in an accident, I’m devastated, I send you the information about the funeral, I hope you can come: [spyware link]" (source)

USEMBASSY.GOV/ WE DETECTED A PROBLEM WITH YOUR VISA PLEASE GO PROMPTLY TO THE EMBASSY. SEE DETAILS [spyware link] (source)

LX 1955 BCN-ZRH 26Jun2020 - Click on the link to receive your mobile boarding pass [spyware link] (source)

Be aware: Some spyware is deployed using exploits that don't require you clicking a link at all ("zero click exploits"). These might show up as missed calls on WhatsApp, for example.

Avoid using “Sign in with [Google, Facebook, etc]”

DO: Create an actual account with your email address when signing up on a new site
DO NOT: Use “Sign in with [Google, Facebook, etc]”

Every time you use "Sign in with Google" (or similar options) you're letting Google track which services you use and connect them to your real identity. Creating separate accounts with unique passwords (using your password manager) makes it harder for corporations and authorities to build a complete picture of your online activities.

Have Questions?

Let us know if you have questions or feedback so we can make these guides as useful as possible.