10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

How to secure your phone before attending a protest


Back in June 2020, when this article was first written, people were taking to the streets to organize for justice and protest against systemic racism and police brutality. It was revised two years later when people were taking to the streets to protest the possibility that the Supreme Court might overturn Roe v. Wade (and we know how that turned out).

Currently, in the first months of the new Trump presidency, people are once again wondering how they can make their opinions known. While some may choose to call their representatives or attend town hall meetings, others might be planning to attend protest demonstrations. And because we’ve all become used to carrying a great deal of our personal data with us via our phones and / or watches, it has become more important than ever to guard that data if there is a chance of confrontation or arrest.

The following tips have to do with your phone. If you also have a smartwatch, you may want to simply leave that home.

If you’re attending or even just watching the protests, then be aware: not only is your phone a trove of information about you and the people you communicate with, but it also functions as a tracking device. That’s why it’s important to keep your digital footprint as small as possible — any evidence placing people at protests could be enough to get them arrested.

You should account for the fact that your phone may get lost, stolen, or broken. There’s also a risk of your phone being confiscated by authorities — which means that if they’re able to unlock your phone, they’ll have access to data on you and people you know. It could give authorities access to information about what is being organized and who is doing the organizing and might even give them the information necessary to shut down or prevent protests and arrest those involved.

It’s important to keep your digital footprint as small as possible

In other words, it never hurts to prepare for the worst.

The steps we’ve listed here are a basic start toward protecting your privacy before you attend a protest, but there are additional precautions you can take. Circumstances and situations vary, and none of these methods is 100 percent foolproof, but they do offer increased security for you and your info.

Data security is an ongoing issue, and we’re still learning the ways in which information is collected and sold, what kinds are gathered, who gets access to them, and what can be learned from them. While the following strategies are important if you’re participating in a protest, they are also useful if you want to be careful in your everyday technology use.

Here are some strategies you should consider.

If you can, leave your phone at home

Your phone carries a lot of information about you specifically. When you take it to different locations, it can reveal where you live, where you work, and what protests or demonstrations you’ve attended. In addition, every app you use collects a certain amount of information and has a detailed log of your activity. So, for example, if you use social networking at a protest, that activity and your social media account get tied to the protest. And if your phone is confiscated during or after the protest, it’s possible (according to the Electronic Frontier Foundation) that law enforcement could use a forensic tool to try to extract information from the device.

Your phone carries a lot of information about you

If that’s a concern, it’s better to just avoid carrying all of that data with you. If you can, purchase and use a burner phone instead, and only turn it on when you’re at the site of the demonstration. Download and use more secure, encrypted apps for communication rather than the default text messaging apps on the phone (we’ll share some examples later).

If you’re bringing your own phone, back up your device in case it gets confiscated and remove all personally identifiable information from the phone. Since that may be difficult, you might want to wipe your phone entirely (after you’ve backed up all your stuff, of course) and add just the apps and information you think you’ll need. Try to keep your phone off unless you absolutely need to use it.

Use a password rather than biometrics to secure your data

It’s a good idea to change the settings on your phone so that you can’t unlock it using your fingerprint or facial recognition. These methods make it easier for someone else to get into your phone, especially if you’re there, and law enforcement can legally force people to unlock their phones using their fingerprint or facial recognition. Instead, use a passcode, PIN, or password, which are protected under the Fifth Amendment.

Adjust your settings so that you can’t see message content in notifications when your phone is locked. At the protest, try not to unlock your phone unless you absolutely have to. If you are taking photos and videos, try to access your camera without unlocking your phone. (On an Android phone, this varies depending on your model; for example, on a Pixel, you just press the Power key twice. On an iPhone, you can open the camera from the lockscreen by long-pressing on the camera icon in the lower-right corner or swiping to the side of your lockscreen.)

It’s always a good practice to encrypt your personal information, but in the event that your phone is confiscated, stolen, or lost, you don’t want any information linking you or others to the protests to fall into the hands of authorities (or anyone else). So if you haven’t done so already, now’s a good time to secure your device and any information on it.

Now’s a good time to secure your device and any information on it

It’s a quick and easy process. If you have an Android phone, go to Settings > Security & Privacy> More security & privacy > Encryption & credentials > Encrypt phone. (As always, this may vary somewhat, depending on the phone’s manufacturer.)

For an iPhone, as long as you’ve set a passcode up and you see the text “Data protection is enabled” at the bottom of the Face ID & Passcode (or Touch ID & Passcode) page (which you’ll find in your Settings menu), your information is secure.

Your phone actually gives off a lot of information about you, including where you’ve been. And not only can those signals be intercepted, but they can also be used to locate you and connect you to others. So while you’re at a demonstration, you’ll want your phone to communicate as little information about you as possible.

Keep your phone off or put it in airplane mode, which turns off cellular data and Wi-Fi by default. This stops cell carriers from knowing where you are based on what cell towers you connected to. This will also protect against any stingray attacks, which is when a device pretends to be a cell tower and collects data, including location, from phones around it. Police have been accused of using stingrays, or cell-site simulators, to collect information about phones.

Airplane mode does not disable location services, so it’s a good idea to make sure all of those services are switched off. (On an Android, you can toggle it off at Settings > Location > Use location. On an iPhone, it’s Settings > Privacy & Security > Location Services > Location Services.) If airplane mode interferes with your activities, then switch off cellular data, Bluetooth, location services, and Wi-Fi individually, and only switch on what you need.

Use guided access or pin your screens

Android and iOS both have features that let you access one app while effectively locking the rest of the phone, so you can use that app while keeping the device secure. This is a safer way to post to social media or take photos during a protest, and it’s helpful in the event that you need to show someone, including law enforcement, something on your phone.

The iOS feature is called Guided Access. To enable it, go to Settings > Accessibility > Guided Access and toggle it on. Once it’s on, you’ll see additional settings such as setting the time limits for guided access and locking your display using a passcode. Enable the Accessibility Shortcut on the same page.

To use Guided Access, open the app you would like to use. Press the home button three times, which will lock down all the other apps on your phone. A pop-up will let you select Guided Access; you can then circle areas on the screen you would like to disable. When you’re ready, select Start in the upper-right corner and set a passcode. To disable Guided Access, press the home button three times, select Guided Access, then enter your passcode and tap End on the top-left corner of the next screen.

On Android, the process is called app pinning. Go to Settings > Security & privacy > More security & privacy > App pinning and toggle it on. You can set it so it will ask for your PIN before unpinning. To pin an app, swipe up (if you’re using gesture navigation) or press the square Overview key at the bottom of your screen (if you’re using button navigation) to see all your open apps. When you see the app you want to pin, long-press on the app’s icon at the top of its screen, and select Pin. To unpin it, either swipe up and hold or long-press the back and Overview keys.

If you’re using your own phone, or even if you’re using a burner phone, it’s a good idea to use especially secure apps. The Electronic Frontier Foundation has a list of recommended tools.

For texting, one of the apps that’s most often recommended is Signal, a secure, open-source, end-to-end encrypted messaging app that doesn’t store message metadata. If you’re communicating about protests and demonstrations, this is one of the safest ways to do so. For added safety, you can also take advantage of some of its more secure features by adjusting your privacy settings to, for example, set up a PIN or use call relays. It also has a handy disappearing message feature that causes every message sent in a conversation to disappear after a specific time limit.

If you’re using an Android phone, you may want to use a more secure browser than Chrome. Chief among them is Tor (also available for the iPhone), which protects your identity and information by bouncing your activity through a set of relays. Other security-minded browsers include Brave, which is aggressively anti-advertising, and Vivaldi, which has a number of privacy-enhancing tools. If you’ve got an iPhone, Apple controls the security of its Safari browser pretty strictly (although, in the past, there have been occasional blowups).

Finally, a search engine like DuckDuckGo won’t store your search history or connect it to your IP address.

In or out of a demonstration, it’s always a good idea to download and set up a VPN on your phone. A VPN hides your activity by encrypting your connection. Also keep in mind that VPNs that charge a subscription fee are usually more trustworthy than free ones.

Secure your social media accounts

If you want to protect your identity and keep the history of your personal (and business) tweets, Facebook posts, and other social media history private, consider creating a separate email account that isn’t linked to any personal information. You can then use that to create separate social media accounts for protest or demonstration photos and footage.

It’s also always a good idea to have two-factor authentication set up on all of your accounts.

If you’re taking photos and videos

Try not to take any photos or videos with identifying information about others without their consent. Be mindful of objects in the photos, such as street signs and landmarks, that may give away the location if that’s something you want to hide. Afterward, blur out other demonstrators and scrub the photos of any metadata.

If your device is confiscated

Don’t unlock it, if at all possible. (As previously mentioned, your Fifth Amendment rights are covered if it’s locked using a PIN or password, but not if you can unlock it with a fingerprint or face image.) As soon as possible, change your passwords for any apps or accounts you have, and disconnect your accounts from that device.

Update, February 25th, 2025: This article was originally published on June 4th, 2020. It has been updated to be more in sync with current events and more recent software versions.



Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …