UPDATED 16/8/2020: Updated the dead Smartphone non root privacy hardening guide link with new 2.0 guide link.

Hello! Since I am a privacy advocate and help folks with threat modelling, it would be idiotic and ignorant not to have worked on such a guide for activists engaged with the protests going on in USA and other places.

This serves as a handbook, and I will improve it if there is a need (always room for improvement).


A threat model is simply analysing the requirements and the degree to which you need to utilise tools (in case of digital, software and hardware) for privacy in all aspects of life. It consists of:

  • threat actors (entities that can affect you like corporations, governments, police)
  • threat vectors (sources of spying or malware)
  • threat causes (X --> Y --> Z correlations)


  • Use EFF’s guide on identification of type of surveillance (police cameras, drones, FLIR/thermal cameras).

  • If possible, take a covert trip yourself (or if your trusted comrade can) to the protest area before the actual protest to identify locations, area setup, objects like trees or area divisions or mini-landmarks, and prepare code words for these with your team or fellow activists secretly. You can photograph these places for better planning. Plotting 101.

  • Timing is key. Pre plan times you would send messages to each other, so you can keep device connectivity to a minimum. This allows for lesser chance of device comms interception.

  • Use masquerade eye masks, they are good enough for face recognition protection. Cheap and effective.

  • Wear less crafty and fashion-y clothes with complicated structures that could hinder your own mobility during running or sitting in protest area.

  • Someone could grab your hoodie hat to immobilise you. Wear a tight fitting T shirt or jeans with less pockets to not become an obstruction to your mobility. You get the drift.

  • The lighter stuff you carry on you, the more mobile you are. The lesser stuff you carry, the more independent you are.

  • COVID-19 instruction: wear a 3 ply mask or 3M N90xx mask to stay safe from virus breeding in crowds, do not be an idiot, keep and use 70% isopropyl alcohol sanitiser on you at all times before eating


###Threat actors:

  • any ultra patriotic acquaintance of your friends or family or company coworkers
  • government or national surveillance programs by spying authorities (NSA in USA, CCP in China, NATGRID and CMS in India, Fourteen Eyes
  • police and other legal goons force suppressing your protest rights

###Threat vectors:

  • backdoors in phone software or hardware (from company of same country in which you live)
  • any SMS, Contacts, Telephone reading closed source apps
  • any app with Google or Facebook SDKs and internet permissions (use apps_Packages info from F-Droid to check such apps)
  • spying camera and microphone apps like Facebook (see this)
  • location misusing apps like Instagram or Snapchat (that openly uses location at all times to track friends and yourself)

###Threat causes:

  • backdoors in phone used by government in which you live (via phonemaker cooperating with government, subpoenas, data requests)
  • SMS, Contacts misusing apps that collect data to coordinate with government surveillance apparatus for legal threats and action
  • microphone, camera, location data easy to misuse against you for political opinions against own government
  • any closed source app with internet data or location access

###Safeguard measures:

  • use the Lockdown feature in Android and iOS to cripple biometrics, or restart your phone quickly.
  • keep WiFi, GPS location, Bluetooth and cellular mobile data off as much as you can
  • use as much open source apps as possible
  • throw out those Google and Apple signed in accounts from your device
  • use Briar from F-Droid for anonymous nearby communication via WiFi and Bluetooth, no internet needed
  • use NetGuard app firewall from F-Droid to whitelist internet and WiFi app access, minimise list of apps that require internet
  • sandbox closed source apps or deny them their permissions as needed using Shelter from F-Droid
  • use CameraV app to click photos
  • use PilferShush Jammer from F-Droid with passive jamming to block microphone if not using
  • keep phone in secure pockets so it is not easily snatchable
  • use back covers with straps that allow stronger phone gripping

###Devices to use:

  • if possible, WiFi only tablet or device (Necunos Phone) or a smartphone without SIM card
  • if you must use a smartphone with SIM card, use a Huawei. (Cellebrite showed that Huaweis are uncrackable, while Samsungs or Pixels are less compromised, and iPhones are completely crackable. Also, Huawei attained BSI certification for data privacy management.) Huawei does not cooperate with governments which is proven by the lack of evidence to date.
  • rooted Asus/Motorola/FairPhone/LG/Sony with LineageOS and NetGuard app firewall, but these are easily crackable by Cellebrite’s tools so beware


I guess this should do the job. If you have any suggestions, comment on the writeup. Good luck, fight for your rights, activists!


I just found this out and I am amazed how useful this can be,gotta save it. Thanks for your work!!

This is insanely well thought out


Appreciated!:beaming face with smiling eyes:

privatelife - privacy, security, freedom advocacy

    This community is meant to advocate privacy, security and freedom in an concise manner, free of prejudice bias, free of politics, free of cultist thoughts.

    Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. - Edward Snowden

    Reddit: https://old.reddit.com/r/privatelife

    Matrix: https://matrix.to/#/#privatelife:matrix.org

    Telegram: https://t.me/r_privatelife


    1. Opinions are welcome, facts more so. Attack arguments, not people. Hating, baiting, trolling, flaming will be dealt with strictly.

    2. Discuss closed source software with caution. Advocating for it strongly (cult brigading) can be treated as violation of this rule.

    3. Editing titles of article links is strictly prohibited, unless and until the summarisation remains accurate to the context of the article or paper. Such link post will be removed without questioning.

    4. Targeting of any country, person or nation is strictly prohibited without valid reasoning. Evidence if not presented against the specific company/corporation/individual will be treated as personal attack and/or hate speech. This will result in a warning, then ban system.

    5. NO PERMA BANS! Ban system will work as follows:

    1 day --> 3 day --> 1 week --> 2 weeks --> 3 weeks --> 1 month --> 3 months --> 6 months

    Severity of the ban system will be dealt with based on degree of violation and circumstances.

    1. NO FACT-LESS EVIDENCES, NO FALSE RHETORIC Evidence has to be credible. The onus of this lies on the claimant. The same applies on the user who questions proven evidence. Violation of this rule will be dealt with strictly.

    2. Copycat posts serve to litter the community, increasing quantity and decreasing quality of posts. As such, posts will be removed. Repeated attempts will receive warning.

    • 0 users online
    • 1 user / day
    • 1 user / week
    • 2 users / month
    • 6 users / 6 months
    • 562 subscribers
    • 182 Posts
    • Modlog