mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-23 23:01:04 -04:00
tamper syntax
This commit is contained in:
parent
4b173230e1
commit
e02f39f359
4 changed files with 49 additions and 49 deletions
|
@ -192,6 +192,6 @@ Why recommend a Pixel over a Linux desktop phone? Linux desktop phones like the
|
|||
|
||||
With the set-up described in this guide, if a cop starts with your name, they won’t be able to simply look it up in a cellular provider database to get your phone number. If you use the phone as a Wi-Fi only device and always leave it at home, it cannot be used to determine your movement profile and history. If you use a VoIP number, it's accessed through a VPN, so even if that number is known, it can't be used to locate you. All communications with comrades use [end-to-end encryption](/posts/e2ee/) so they do not aid in network mapping. Even if you are unlucky enough to be the target of a well-funded investigation, the hardened operating system makes it difficult to compromise with spyware, and such a compromise should be [detectable](#auditor).
|
||||
|
||||
By storing the phone in a tamper-evident manner when it's not in use, you'll be able to tell if it's been physically accessed. See the guide [Making Your Electronics Tamper-Evident](/posts/tamper/).
|
||||
By storing the phone in a tamper-evident manner when it's not in use, you'll be able to tell if it's been physically accessed. See the guide [Make Your Electronics Tamper-Evident](/posts/tamper/).
|
||||
|
||||
The [forum](https://discuss.grapheneos.org/) is generally very helpful for any remaining questions you may have.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue