Home
|
Checklist
|
Handout
|
Flyer
DE
|
EN
Smartphone, shut up!
✔ A checklist for your mobile security
You care about your safety
You share this list with others
You check this list from time to time
You have already taken part in a cryptoparty
You know your most important contacts and logins by heart
You are not using a dumbphone
You have removed your SIM card number
You have set up a screen lock
Your smartphones are encrypted
You can switch off your devices quickly
You are using a privacy film
Your SIM card is protected with a PIN
You do without memory cards
You do not use biometric activation
You have deactivated the developer features
You only use your own charging cable
Your operating system has verified boot
You have sealed your device
You have noted the unique numbers of your device
You make regular backups
Your backups are encrypted
Your backups are stored decentrally and also outside your home
You practise restoring your backups
You do not store unused appliances in your home
You do not unlock your smartphone on demand
You have overwritten your phone once
Deactivate unused interfaces
Avoid Bluetooth devices such as earbuds if possible
Cameras that are not in use are covered
You use data-saving telephone tariffs
You have objected to the marketing of your transaction data
You have not activated your mobile data connection continuously
You don't take your cell phone to the demo
You don't use apps like "SnoopSnitch"
You use anonymous SIM cards
You use your smartphone exclusively for one SIM card
You often use other SIM cards and a proxy phone
You withdraw your credit anonymously
You don't give out your phone number
You don't make calls with your anonymous card
You have purchased SIM cards and phones anonymously
You use number suppression wisely
You dial 110 and 112 carefully
You have set up a block for third-party providers
You don't give your name immediately when you answer the phone
You are using a free operating system
You have freed your phone from bloatware
You have deactivated or deleted your advertising ID
Are your apps and system up to date?
Do you use a password manager?
You only install apps from trustworthy sources
You check access rights carefully
You use alternative app stores
You do without Google Play services and Apple services
You use privacy-friendly web browsers
You waive root rights
You use secure messengers
Activate two-step verification in your messengers
Do not share your Apple ID and deactivate iMessage
You restart your phone often
Your second factor for logins is on a separate device
Use alternative frontends
You use passkeys
You secure your accounts with two-factor authentication
You are using an ad blocker
Do you use different pseudonyms and e-mail addresses?
You do not use your pseudonyms at the same time
You use TOR or the TOR browser
You use privacy-friendly search engines
You only use encrypted cloud storage
You use VPNs wisely
You delete metadata from your images
You read through data protection declarations
You encrypt your emails
Delete unused accounts
You check whether you are affected by data leaks