Smartphone Security and Privacy Guide

The Current State of Smartphones Most people own a smartphone. They are extremely useful tools, but they are also a nightmare for security and privacy. This guide will attempt to help you improve your security and privacy while using a smartphone, without losing useful functionality. There are, mainly, three types of smartphone: Android Devices iOS Devices (the iPhone) Dumb phones / brick phones / feature phones (KaiOS or custom) Android Android by default is the most customizable of the bunch. Different brands usually have their own software, and also ship Google apps. The most important one being Google Play Services. This application connects to Google to allow the Play Store to function, logging in with Google, and power most Google Apps. It also shares a lot of user data with Google. ...

June 16, 2024 · 7 min · 1358 words · TrudeEH

Firewall [UFW]

A firewall monitors and controls all incoming and outgoing network traffic, and can be implemented in the hardware or software level. See All Open Ports All ports opened by a program, including those blocked by a firewall. sudo ss -tupln Software Firewall (UFW) # Enable the SSH port if it is being used sudo ufw limit 22/tcp # `limit` is used to prevent bruteforce # Set default connection settings sudo ufw default deny incoming sudo ufw default allow outgoing # Open ports for the services running sudo ufw allow 80/tcp # Web server 1 sudo ufw allow 443/tcp # Web server 2 # Check if UFW is running and is configurations sudo ufw status numbered # Delete an entry sudo ufw delete 2 # Number given by `status numbered` # Enable UFW sudo ufw enable Block Pings Blocking pings prevents hackers from quickly discovering the server. It is still possible to scan all ports on the server and eventually find any open one, but it adds another layer of security. ...

2 min · 282 words · TrudeEH