Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| phone_security [2025/04/06 17:58] – moosatx | phone_security [2025/04/06 18:02] (current) – [Avoid External Storage] moosatx | ||
|---|---|---|---|
| Line 127: | Line 127: | ||
| In a similar vein, any functionality you have enabled while your device is unlocked can pose a security risk. It is always best practice to reduce your attack surface by disabling these options whenever possible. Even though these features are typically designed to not pose a security risk to your data, they have been known to be exploited in the past to bypass lock screens and other security features. | In a similar vein, any functionality you have enabled while your device is unlocked can pose a security risk. It is always best practice to reduce your attack surface by disabling these options whenever possible. Even though these features are typically designed to not pose a security risk to your data, they have been known to be exploited in the past to bypass lock screens and other security features. | ||
| + | 1. Open Settings | ||
| + | 2. Navigate to Face ID & Passcode | ||
| + | 3. Scroll to the Allow Access When Locked section | ||
| + | |||
| + | 4. Switch all features you don't need off | ||
| + | |||
| + | On Android, disabling functionality while the phone is locked will vary widely by manufacturer. Some like Samsung provide more flexible options in their lock screen settings, but others like Google do not provide the option to disable the quick settings panel or other similar features. | ||
| + | |||
| + | |||
| + | ===== Avoid External Storage ===== | ||
| + | |||
| + | |||
| + | Your Android phone might have the option to store files or photos on a microSD card, but these cards are not always subject to the same encryption standards as your phone' | ||
| + | |||
| + | computer later. Additionally, | ||
| + | |||
| + | Consider Your Phone' | ||
| + | |||
| + | Exploits against smartphones are discovered on a very regular basis, and spyware companies that work with law enforcement-like Cellebrite- abuse these exploits to crack into stolen devices. If your phone is no longer receiving regular updates from its manufacturer, | ||
| + | |||
| + | In general, we consider the latest iPhone and latest Google Pixel to be the most secured against this sort of threat. You can increase your security further by using a hardened alternative operating system on your Google Pixel. | ||
| + | |||
| + | Robust security information about phones from other manufacturers is less common. If you use a different device you may still consider the risks to be worth it, but if confiscation is of particular concern to you, or especially if your phone no longer receives security patches, you may want to consider leaving the phone at home. | ||
