The right to assemble and protest is enshrined in American law, but it can still be dangerous to hit the streets to make your voice heard. Your devices are a treasure trove of information about you, and you may not always know who’s collecting that data. Take a few minutes before you go to assess your digital and physical safety. Even if you have nothing to hide, you don’t want to accidentally give law enforcement officials any information you didn’t intend to share. Follow these tips to lock down your phone before a protest or other peaceful assembly.

  • 0ndead@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    13 seconds ago

    Buy a used phone on eBay. Activate with phreeli at a library. Only turn on phone at protests. Turn off when you leave.

  • AnimalsDream@slrpnk.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 hour ago
    1. Get a cheap mobile specifically for protests, especially using it for pictures and video.
    2. Set it up to livestream everything, so that any video evidence gained can’t be taken away.
    3. Get a faraday bag for when you need to put that mobile away and not be tracked.

    Maybe I’m missing something though?

  • unexposedhazard@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    22
    arrow-down
    1
    ·
    edit-2
    2 hours ago

    Shitty article. Doesnt even contain the words SIM card or IMEI so it has no business advising people on whats safe to bring to a protest. There is no such thing as cop-proofing a mobile phone unless all wireless modules have been removed. The cops can and do track peoples cell tower signal derived locations and they can log active Wifi/Bluetooth MAC addresses in their vicinity.

    As others have said, just dont bring it if you are scared. Consider just using a bodycam or gopro style camera.

    • sobchak@programming.dev
      link
      fedilink
      English
      arrow-up
      4
      ·
      59 minutes ago

      Modern phones rotate random MAC addresses. For WiFi, capturing SSID probes can be enough to track somebody though (some phones also have some mitigation for that too, like not probing for an SSID after it hasn’t been seen for some amount of time). Even when turned off, many phones, including iPhones, turn into BLE beacons similar to AirTags, which can be used to track you.

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        52 minutes ago

        Good additions, thanks.

        Modern phones rotate random MAC addresses

        My phone does, but im not sure if normal google/apple phones do by default.

    • Jyek@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      3
      ·
      1 hour ago

      This is slightly false in an alarmist fashion. At least in the US, the police are not actively tracking anything without a subpoena to the cellular provider of the phone in question. They can look at the location data after the fact, using a court ordered subpoena. They can also use live location data in an emergency situation,also using a court ordered subpoena.

      Cellular data from cell towers on cell networks are private property of the cellular provider companies. That’s not to say you are private while on them. Just that the police are not actively tracking your location through them without great effort for each individual they wish to track.

  • inclementimmigrant@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 hours ago

    Cripes all of that and not even, “Buy a burner SIM card”, “Use a VPN at all time if you have to use data”, “For the love of god don’t use biometrics as authorization, use a alphanumeric password to unlock”, “Use the damn encryption solution provided by your phone’s OS”.

    • Jyek@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      A VPN does not stop location data for your physical device when looking at cellular data from the carrier. Your location can and is always triangulated using cell towers. VPNs only ever protect your IP address from being geolocated and encrypting the data downloaded and uploaded while connected. Bit streams are still sent and received from a physical place in the world before the VPN hides your traffic and that is recorded by the cell provider.

    • partofthevoice@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      I turned off biometrics for unlocking the phone. Still works for downloads, passwords, everything but unlocking the phone. I’ve barely noticed a change.

  • LoafedBurrito@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 hour ago

    These articles mean nothing. You have 2 options.

    1. Leave ALL electronics at home and do not bring anything to the protest that connects to a tower or the internet.

    2. Just deal with the fact you are being tracked and deal with it.

  • Puddinghelmet@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    4 hours ago

    Cant u just use encrypted messaging services like whatsapp signal telegram? SMS isn’t encrypted. And this is also why you shouldn’t give tech billionaire companies so much power as a nation lol they abuse ur privacy thats why I love how EU is still trying to protect our rights at least

    • ApertureUA@lemmy.today
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      3 hours ago

      Not relevant. Unless you use airplane mode, it will be visible that your phone was at the place.

    • onehundredsixtynine@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      edit-2
      3 hours ago

      whatsapp signal telegram

      Telegram isn’t encrypted, and honestly you shouldn’t use it.[1] Whatsapp and Signal are US-based, which means that they will give up your data on the first request.

      Use actually secure messengers, like Delta Chat, SimpleX, or Matrix with end-to-end encryption.

      • Bazoogle@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        47 minutes ago

        Whatsapp and Signal are US-based, which means that they will give up your data on the first request.

        This is true. In regards to Signal, they do always comply with the governments request for data. The things is, Signal has next to no data on you. So when they comply, they give them everything they have (which is next to nothing). You can see everything they have given up here: https://signal.org/bigbrother/

      • Kay Ohtie@pawb.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        Signal have published several times when they receive a request for data and their response.

        Due to the mechanisms they employ, all they can actually give is if there’s an account associated with a phone number and the last time it logged in, if even that last bit. There’s some fairly detailed articles diving into how this works so well under the hood from a cryptographic standpoint, but it basically amounts to even addresses of users being able to be secret to minimize shared metadata to a bare minimum.

        Also the software is entirely open-source – app and server both – and are frequently audited on this. The server never has an opportunity to receive any plain-text data to store.

        The weak spot is always just having access to your device.

      • Rivalarrival@lemmy.today
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        It’s a little clunky, but KryptEY is an on screen keyboard that can encode/decode messages. The encoded messages can be transmitted over any service.

  • ZombieCyborgFromOuterSpace@piefed.ca
    link
    fedilink
    English
    arrow-up
    62
    arrow-down
    1
    ·
    11 hours ago

    Just don’t bring it. Bring a digital pocket camera instead to document stuff.

    Nowadays, you can’t use a mobile phone without signing in to some Google service or Apple. It’s mandatory. Giving them access to every data you own.

  • mr_sunburn@lemmy.ml
    link
    fedilink
    English
    arrow-up
    76
    arrow-down
    2
    ·
    13 hours ago

    This might be relevant for following ICE around or direct action, but at this point there’s almost zero personal risk from attending something like a rally or a march.

    My relatives and even friends my age are afraid to go to protests. They read stuff like this, and it acts as demobilization messaging. In my experience, once you get them to go once they’re no longer afraid to engage, but there’s an initial fear and anticipatory obedience that has to be overcome.

    inb4 protests do nothing: getting people to stick their toe in the water helps build commitment that will one day be necessary to gain critical mass for more organized disobedience.

    • SpacetimeMachine@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 hours ago

      ICE has literally started going door to door in Minnesota looking for immigrants and activists. It’s already starting, people need to be protecting their privacy now.

    • sem@piefed.blahaj.zone
      link
      fedilink
      English
      arrow-up
      8
      ·
      4 hours ago

      I go to protests without my phone, and I’m afraid every time.

      I get that nothing is likely to happen to me, but it could. I get that this is am irrational fear. But idk strategically what to do.

    • CommanderCloon@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 hours ago

      This might be relevant for following ICE around or direct action, but at this point there’s almost zero personal risk from attending something like a rally or a march.

      No. If the data exists at any point, then a future threat will be able to exploit it, so full on nazi style fascism might not be here yet, but when it is, you’ll be in danger. Data can sleep forever before it becomes a threat.

  • Carmakazi@piefed.social
    link
    fedilink
    English
    arrow-up
    132
    arrow-down
    2
    ·
    18 hours ago

    IMO just having your personal device on you in the presence of a protest puts you in danger. They have ample tools to track cellular devices that basically cannot be guarded against without disabling the function altogether, such as with a Faraday bag. They will catch and log that you were at a protest, and use that against you later.

  • empireOfLove2@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    84
    ·
    17 hours ago

    Don’t bring your phone period. Any and all devices can be broken into by law enforcement. Buy a burner with cash if you need some kind of communication.

    • anon_8675309@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      5 hours ago

      Yes a burner that you don’t activate. Keep it in a faraday bag. In an emergency you can take it out and call 911.

    • Zorsith@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      38
      ·
      11 hours ago

      Its not the device cracking that’s the problem; its the “your device was identified at the protest we have labeled a riot and has been tracked to your home, which we will now raid in the middle of the night”.

      • db2@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        13 hours ago

        No, , this isn’t the 90s. You want a many copies as possible immediately, later might not happen.

  • baller_w@lemmy.zip
    link
    fedilink
    English
    arrow-up
    11
    ·
    12 hours ago

    Faraday bag all electronic items; phone, smartwatch; hell, I’d even bag my car keys. Cover your face, especially the eye area. Make your voice heard, but don’t be a data point.

    • anon_8675309@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 hours ago

      Yeah. I see so many protesters with their face not covered. Cover your face!!!

      Also, dress like them. You want to create as much confusion as possible.

  • nutsack@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    38
    arrow-down
    2
    ·
    edit-2
    15 hours ago

    I bring my phone, and my wallet, and my keys, and a $7,000 camera, and my lawyer’s phone number in my head.

    they can suck my balls

    always film cops

  • suicidaleggroll@lemmy.world
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    1
    ·
    17 hours ago

    Shut off and leave your phone at home, buy a pay-as-you-go to bring with you for emergency contact/coordination

    • partial_accumen@lemmy.world
      link
      fedilink
      English
      arrow-up
      49
      ·
      17 hours ago

      Shut off and leave your phone at home, buy a pay-as-you-go to bring with you for emergency contact /coordination

      Leave the pay-as-you-go phone powered off too, and only power it up if you actually have to use it. If you have to use it once, you need to get a replacement for a future event.

      I’m thinking perhaps something like Meshtastic transmitters and receivers should be used for coordination instead.

      • 7U5K3N@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        19
        ·
        16 hours ago

        Meshtastic is exactly what needs to be implemented

        I ran across that instance the other day and immediately thought about coordination.

        It’s like sneaker net for piracy.

      • Brkdncr@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        15 hours ago

        Meshtastic is just as susceptible to listening and isn’t perfect at encryption or anonymity but should be another tool to consider when cellphone towers are down or otherwise unusable.

        • floquant@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          4
          ·
          9 hours ago

          It’s alright for non-critical stuff. Ok for getting help, not the best for coordinating action.

          Reticulum is an alternative network/protocol that focuses more on security and interconnection of different networks

    • FlexibleToast@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      17 hours ago

      I believe there are Bluetooth network protocols that mesh that would work for messaging and not require cell service. It would be smart to organize using something like that and just use any cell phone without cell service turned on. That still gives you the ability to call 911 in case of emergencies as well.

      • Em Adespoton@lemmy.ca
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        1
        ·
        edit-2
        16 hours ago

        Cell service is always turned on on a phone, even with no SIM card and the phone in airplane mode, and for most phones, even when the phone is “off”. They still ping the local towers semi regularly; they just don’t ramp up transmission power ir try to establish a full connection.

        Anyone got a list of Bluetooth devices without a cell antenna where the BT MAC is regularly scrambled?

      • frongt@lemmy.zip
        link
        fedilink
        English
        arrow-up
        7
        ·
        17 hours ago

        True, but if surveillance is your concern, they are monitoring Bluetooth devices too.

        • FlexibleToast@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          16 hours ago

          Does that matter? If it’s a device that you bought used just for this? There is no name attached to that device at that point. Buy it used on Craigslist, use it for the event, throw it away. It can be any cheap, crappy phone.

      • Lee Duna@lemmy.nzOP
        link
        fedilink
        English
        arrow-up
        6
        ·
        17 hours ago

        You can use Briar, BitChat, or Bridgefy to communicate, without having internet connections. I’ve only tried Briar, which works with cell networks, wifi, also bluetooth.

      • Horsecook@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        16 hours ago

        That show finished airing 18 years ago…

        Thinking about it, that show is a terrible reference. Modern phones didn’t exist in it, as they hadn’t been invented yet. The first iPhone was released while the last season of The Wire was filming, and the App Store didn’t come out until a few months after the final season had aired. It’s from an entirely different era.