The right to assemble and protest is enshrined in American law, but it can still be dangerous to hit the streets to make your voice heard. Your devices are a treasure trove of information about you, and you may not always know who’s collecting that data. Take a few minutes before you go to assess your digital and physical safety. Even if you have nothing to hide, you don’t want to accidentally give law enforcement officials any information you didn’t intend to share. Follow these tips to lock down your phone before a protest or other peaceful assembly.

  • Shortstack@reddthat.com
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    55 minutes ago

    Going to a protest? Don’t bring your phone without doing this first

    I’m skeptical of bringing your phone at all, either in airplane mode or off, because modern phones still broadcast location when it’s ‘dead’ in order for you to find it. But I don’t know enough about that to say for sure

    • frongt@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      44 minutes ago

      Off should be off. Airplane mode often leaves WiFi and Bluetooth on because airplanes allow them. And GPS doesn’t transmit anything, but if it’s enabled it’s still recording your location.

    • hector@lemmy.today
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 hour ago

      Others said not all work well though.

      Wrapping in aluminum foil works. Thicker is better, more wraps is better. But one wrap stopped my test call.

      • aesthelete@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 hour ago

        I tested mine using my keyfob (which is what I bought it for). Test, for sure, but there are ones that work. Aluminum foil also works.

  • 0ndead@infosec.pub
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    5 hours ago

    Buy a used phone on eBay. Activate with phreeli at a library. Only turn on phone at protests. Turn off when you leave.

    • PillowD@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 hours ago

      Interesting, but $25 a month. Tello dot com has a cheap plan for $7.91 a month after taxes and fees. I use it on a $50 Amazon blu phone because I wanted something else for 2FA, and I have a phone ready if my main one breaks or gets lost.

  • AnimalsDream@slrpnk.net
    link
    fedilink
    English
    arrow-up
    21
    ·
    6 hours ago
    1. Get a cheap mobile specifically for protests, especially using it for pictures and video.
    2. Set it up to livestream everything, so that any video evidence gained can’t be taken away.
    3. Get a faraday bag for when you need to put that mobile away and not be tracked.

    Maybe I’m missing something though?

    • PillowD@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      4 hours ago

      I got a body cam for about $50 amazon dot com/dp/B0BHZ4PRRG, currently unavailable. Makes a great dashcam too. When the usb charging cable is plugged in it turns on when you start your car and turns off when you turn off your car.

      The only thing you’re missing is to put a piece of white tape on the sole of your shoe. When you are lying on the ground It’s a cop signal that you are an undercover agent.

  • unexposedhazard@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    38
    arrow-down
    1
    ·
    edit-2
    7 hours ago

    Shitty article. Doesnt even contain the words SIM card or IMEI so it has no business advising people on whats safe to bring to a protest. There is no such thing as cop-proofing a mobile phone unless all wireless modules have been removed. The cops can and do track peoples cell tower signal derived locations and they can log active Wifi/Bluetooth MAC addresses in their vicinity.

    As others have said, just dont bring it if you are scared. Consider just using a bodycam or gopro style camera.

    • sobchak@programming.dev
      link
      fedilink
      English
      arrow-up
      9
      ·
      6 hours ago

      Modern phones rotate random MAC addresses. For WiFi, capturing SSID probes can be enough to track somebody though (some phones also have some mitigation for that too, like not probing for an SSID after it hasn’t been seen for some amount of time). Even when turned off, many phones, including iPhones, turn into BLE beacons similar to AirTags, which can be used to track you.

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        almost worthless. I just learned that the android 13 xiaomi phone of a family member broadcasts some of the wifi AP names it knows when scanning for available networks! constantly! why the fuck it does I don’t know because neither are hidden networks that would need this, and there’s no setting for it

        • sobchak@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          45 minutes ago

          Yeah, I’m guessing it’s so if you “hide” the network, it will still connect to it. Anyone can scan these advertisements, then go to wigle.net and likely get a good idea of where you live/work.

        • chaospatterns@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          3 hours ago

          Are those networks marked as hidden SSID networks? Hidden networks require the client STA to broadcast them to find them.

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 hours ago

        Good additions, thanks.

        Modern phones rotate random MAC addresses

        My phone does, but im not sure if normal google/apple phones do by default.

        • lepinkainen@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          iPhones do by default, you need to specifically turn on fixed IP at home to identify the damn phone reliably

    • Jyek@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      10
      ·
      6 hours ago

      This is slightly false in an alarmist fashion. At least in the US, the police are not actively tracking anything without a subpoena to the cellular provider of the phone in question. They can look at the location data after the fact, using a court ordered subpoena. They can also use live location data in an emergency situation,also using a court ordered subpoena.

      Cellular data from cell towers on cell networks are private property of the cellular provider companies. That’s not to say you are private while on them. Just that the police are not actively tracking your location through them without great effort for each individual they wish to track.

        • chaospatterns@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          3 hours ago

          I thought this was using SDKs embedded in apps and advertising platforms. This is a different threat model. You need to block ads and prefer using websites instead of apps which have more access to device info like the advertising ID.

          If you’ve got an Android, go to Settings, search for ads, and find the advertising ID and delete the ID. It’s a stable identifier that can be used to identify your phone.

          Switch to more private browsers like Firefox for Mobile and install uBlock Origin.

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        6 hours ago

        Yeah cell tower data is private just like your google search history is private. Which means absolutely not private. Also cops can (and do) use fake cell towers to make your phone connect to something that they have live access to.

      • Zangoose@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        6 hours ago

        They can also use live location data in an emergency situation,also using a court ordered subpoena.

        What qualifies as an “emergency situation”? I imagine that definition could be stretched pretty thinly

  • LoafedBurrito@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    6 hours ago

    These articles mean nothing. You have 2 options.

    1. Leave ALL electronics at home and do not bring anything to the protest that connects to a tower or the internet.

    2. Just deal with the fact you are being tracked and deal with it.

  • inclementimmigrant@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    7 hours ago

    Cripes all of that and not even, “Buy a burner SIM card”, “Use a VPN at all time if you have to use data”, “For the love of god don’t use biometrics as authorization, use a alphanumeric password to unlock”, “Use the damn encryption solution provided by your phone’s OS”.

    • Jyek@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      ·
      6 hours ago

      A VPN does not stop location data for your physical device when looking at cellular data from the carrier. Your location can and is always triangulated using cell towers. VPNs only ever protect your IP address from being geolocated and encrypting the data downloaded and uploaded while connected. Bit streams are still sent and received from a physical place in the world before the VPN hides your traffic and that is recorded by the cell provider.

    • partofthevoice@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 hours ago

      I turned off biometrics for unlocking the phone. Still works for downloads, passwords, everything but unlocking the phone. I’ve barely noticed a change.

  • Puddinghelmet@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    9 hours ago

    Cant u just use encrypted messaging services like whatsapp signal telegram? SMS isn’t encrypted. And this is also why you shouldn’t give tech billionaire companies so much power as a nation lol they abuse ur privacy thats why I love how EU is still trying to protect our rights at least

    • ApertureUA@lemmy.today
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      8 hours ago

      Not relevant. Unless you use airplane mode, it will be visible that your phone was at the place.

    • onehundredsixtynine@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      edit-2
      8 hours ago

      whatsapp signal telegram

      Telegram isn’t encrypted, and honestly you shouldn’t use it.[1] Whatsapp and Signal are US-based, which means that they will give up your data on the first request.

      Use actually secure messengers, like Delta Chat, SimpleX, or Matrix with end-to-end encryption.

      • Bazoogle@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 hours ago

        Whatsapp and Signal are US-based, which means that they will give up your data on the first request.

        This is true. In regards to Signal, they do always comply with the governments request for data. The things is, Signal has next to no data on you. So when they comply, they give them everything they have (which is next to nothing). You can see everything they have given up here: https://signal.org/bigbrother/

      • Kay Ohtie@pawb.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 hours ago

        Signal have published several times when they receive a request for data and their response.

        Due to the mechanisms they employ, all they can actually give is if there’s an account associated with a phone number and the last time it logged in, if even that last bit. There’s some fairly detailed articles diving into how this works so well under the hood from a cryptographic standpoint, but it basically amounts to even addresses of users being able to be secret to minimize shared metadata to a bare minimum.

        Also the software is entirely open-source – app and server both – and are frequently audited on this. The server never has an opportunity to receive any plain-text data to store.

        The weak spot is always just having access to your device.

      • Rivalarrival@lemmy.today
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        It’s a little clunky, but KryptEY is an on screen keyboard that can encode/decode messages. The encoded messages can be transmitted over any service.

  • ZombieCyborgFromOuterSpace@piefed.ca
    link
    fedilink
    English
    arrow-up
    64
    arrow-down
    1
    ·
    16 hours ago

    Just don’t bring it. Bring a digital pocket camera instead to document stuff.

    Nowadays, you can’t use a mobile phone without signing in to some Google service or Apple. It’s mandatory. Giving them access to every data you own.

  • mr_sunburn@lemmy.ml
    link
    fedilink
    English
    arrow-up
    85
    arrow-down
    2
    ·
    18 hours ago

    This might be relevant for following ICE around or direct action, but at this point there’s almost zero personal risk from attending something like a rally or a march.

    My relatives and even friends my age are afraid to go to protests. They read stuff like this, and it acts as demobilization messaging. In my experience, once you get them to go once they’re no longer afraid to engage, but there’s an initial fear and anticipatory obedience that has to be overcome.

    inb4 protests do nothing: getting people to stick their toe in the water helps build commitment that will one day be necessary to gain critical mass for more organized disobedience.

    • sem@piefed.blahaj.zone
      link
      fedilink
      English
      arrow-up
      15
      ·
      9 hours ago

      I go to protests without my phone, and I’m afraid every time.

      I get that nothing is likely to happen to me, but it could. I get that this is am irrational fear. But idk strategically what to do.

    • SpacetimeMachine@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 hours ago

      ICE has literally started going door to door in Minnesota looking for immigrants and activists. It’s already starting, people need to be protecting their privacy now.

    • CommanderCloon@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 hours ago

      This might be relevant for following ICE around or direct action, but at this point there’s almost zero personal risk from attending something like a rally or a march.

      No. If the data exists at any point, then a future threat will be able to exploit it, so full on nazi style fascism might not be here yet, but when it is, you’ll be in danger. Data can sleep forever before it becomes a threat.

  • Carmakazi@piefed.social
    link
    fedilink
    English
    arrow-up
    143
    arrow-down
    3
    ·
    23 hours ago

    IMO just having your personal device on you in the presence of a protest puts you in danger. They have ample tools to track cellular devices that basically cannot be guarded against without disabling the function altogether, such as with a Faraday bag. They will catch and log that you were at a protest, and use that against you later.

    • U7826391786239@lemmy.zip
      link
      fedilink
      English
      arrow-up
      72
      ·
      22 hours ago

      don’t leave out the fact that they’ll just shoot you in the face for no reason, and then get “absolute immunity”

  • empireOfLove2@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    95
    ·
    22 hours ago

    Don’t bring your phone period. Any and all devices can be broken into by law enforcement. Buy a burner with cash if you need some kind of communication.

    • sp3ctr4l@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 hours ago

      Yep, ding ding ding, buy a burner phone, with cash, from a store that doesn’t have many or very good cameras.

      Bringing your real main phone is you thinking you know more about cybersecurity and surveillance than Palantir, than all the cybersec and intel firms the US Mil and Police departments have been partnering with with over a decade now.

      99.99999999% chance you don’t.

    • anon_8675309@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      10 hours ago

      Yes a burner that you don’t activate. Keep it in a faraday bag. In an emergency you can take it out and call 911.

    • Zorsith@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      49
      arrow-down
      1
      ·
      16 hours ago

      Its not the device cracking that’s the problem; its the “your device was identified at the protest we have labeled a riot and has been tracked to your home, which we will now raid in the middle of the night”.

      • db2@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        18 hours ago

        No, , this isn’t the 90s. You want a many copies as possible immediately, later might not happen.

  • nutsack@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    2
    ·
    edit-2
    20 hours ago

    I bring my phone, and my wallet, and my keys, and a $7,000 camera, and my lawyer’s phone number in my head.

    they can suck my balls

    always film cops