Skip to content

Mobile Hardening Guide

Comprehensive security guidance for mobile devices. For activists and rapid response volunteers, securing your phone is critical for protecting yourself and your community.

SourceDocumentDescription
NSAMobile Device Best Practices (PDF)One-page infographic covering essential practices
CISAMobile Communications Best Practice GuidanceLatest guidance addressing telecom intrusions

SimpleX ChatHIGHLY RECOMMENDED

  • No phone number or email required — Can be set up completely anonymously
  • Works on wifi-only devices — Perfect for a child’s iPad or an old phone without service
  • Multiple profiles — Different identities for different purposes
  • No central servers — Decentralized, harder to surveil or shut down
  • Available: iOS | Android | Desktop

Signal — Good option, CISA-recommended

  • Cross-platform, encrypted voice/video calls, group chats, disappearing messages
  • Requires phone number — Less anonymous than SimpleX
  • Available: iOS | Android

For protest coordination: Use SimpleX over Signal when possible. Your phone number is a unique identifier that can be traced.

Do NOT use SMS for multi-factor authentication. SMS is vulnerable to SIM-swapping attacks.

Use instead:

  • Hardware security keys (FIDO2/WebAuthn) — Best option
  • FIDO passkeys
  • Authenticator apps (Aegis, 2FAS)

How to disable 2G:

PlatformSteps
Android 12+Settings → Network & Internet → SIMs → [Your SIM] → Allow 2G → Turn OFF
SamsungSettings → Connections → Mobile Networks → Network Mode → Select LTE/5G only
PixelSettings → Network & Internet → SIMs → Allow 2G → Turn OFF
iPhoneiOS does not allow disabling 2G directly. Use Lockdown Mode (Settings → Privacy & Security → Lockdown Mode) which prevents 2G downgrade attacks.

Why this matters: Stingrays force phones to connect via 2G by jamming stronger signals. With 2G disabled, your phone cannot be forced onto the weaker, interceptable network.

Before a protest or high-risk situation:

  • Consider leaving your phone home or in your car
  • If you must bring it, power it off before entering the area
  • Only power on when you need to make a specific call or capture evidence
  • Power off again immediately after

iPhone emergency lock: Press side button 5 times rapidly — This disables Face ID and requires passcode

Android lockdown: Most Android phones have a “Lockdown” option in the power menu that disables biometrics

Newer hardware often incorporates critical security features that older hardware cannot support. Software updates alone cannot provide maximum security benefits.


  • Enable full device encryption
  • Set strong PIN/password (6+ digits, not sequential or birthdates)
  • Configure auto-lock (5 minutes or less)
  • Enable “wipe after failed attempts” (10 attempts)
  • Disable lock screen notifications for sensitive apps
  • Disable biometrics for unlocking (PINs have more legal protection)
  • Enable automatic OS updates
  • Enable automatic app updates
  • Remove unused applications
  • Review and minimize app permissions regularly
  • Only install apps from official stores
  • Use a password manager (Bitwarden, KeePassXC)
  • Enable hardware-based MFA where possible
  • Use authenticator apps instead of SMS for 2FA
  • Set a SIM PIN to prevent unauthorized SIM changes
  • Contact carrier to add account PIN for porting protection
  • Use end-to-end encrypted messaging (SimpleX preferred, Signal acceptable)
  • Disable SMS fallback in messaging apps
  • Use encrypted email (ProtonMail)
  • Set up SimpleX on children’s devices for family emergency communication
  • Disable Advertising ID / Reset it regularly
  • Turn off personalized ads
  • Disable always-on virtual assistants (Siri, Google Assistant)
  • Review location permissions; use “While Using” instead of “Always”
  • Disable location services for apps that don’t need it

Apple Lockdown Mode is extreme protection for users who may be targeted by sophisticated cyberattacks (journalists, activists, targeted individuals).

When enabled:

  • Blocks most message attachment types except images, video, audio
  • Disables link previews in Messages
  • Blocks incoming FaceTime calls from unknown contacts
  • Requires device unlock to connect accessories

Enable: Settings → Privacy & Security → Lockdown Mode → Turn On

SettingLocationRecommendation
Stolen Device ProtectionFace ID & PasscodeEnable
USB AccessoriesFace ID & PasscodeRequire unlock
Significant LocationsPrivacy → Location Services → System ServicesDisable
iPhone AnalyticsPrivacy → AnalyticsDisable all
Apple AdvertisingPrivacy → Apple AdvertisingDisable

SettingLocationRecommendation
Google Play ProtectPlay Store → Profile → Play ProtectEnable
Find My DeviceSettings → SecurityEnable
Unknown SourcesSettings → SecurityKeep disabled
Developer OptionsSettings → About → Build NumberKeep disabled
USB DebuggingDeveloper OptionsKeep disabled

For maximum privacy, consider replacing stock Android:

OSFocusBest For
GrapheneOSMaximum securitySecurity-focused users (Pixel only)
CalyxOSPrivacy + usabilityTransition from stock Android

F-Droid is an open-source app repository:

Recommended Apps:

  • Aegis - 2FA authenticator
  • KeePassDX - Password manager
  • Element - Matrix messenger
  • TrackerControl - Monitor app tracking

SIM swapping attacks have increased dramatically. Protect yourself:

  1. Set a SIM PIN

    • iOS: Settings → Cellular → SIM PIN
    • Android: Settings → Security → SIM card lock
  2. Add Carrier Account Security

    • Contact your carrier to add a unique passcode
    • Request a “port freeze” or “number lock”
  3. Never Use SMS for High-Value 2FA

    • Banking, email should use authenticator apps or hardware keys
  4. Monitor for Warning Signs

    • Sudden loss of cellular service
    • Unexpected “SIM changed” notifications
    • Unable to make/receive calls or texts

AppPlatformsNotes
BitwardenAllOpen-source, self-hostable
KeePassXCCross-platformOffline, open-source
AppPlatformsNotes
YubiKeyHardwareBest security
AegisAndroidOpen-source
2FASiOS, AndroidOpen-source

Avoid:

  • SMS-based 2FA
  • Google Authenticator (sync not E2EE)
  • Authy (requires phone number)
AppPurposePhone # Required?
SimpleXMost private messaging — PREFERREDNo
SignalEncrypted messaging (CISA-recommended)Yes
ElementMatrix client, decentralizedNo (email optional)
ProtonMailEncrypted emailNo

For children and devices without cell service: SimpleX works on wifi-only devices like iPads and old phones, making it ideal for family communication plans where children need a secure way to contact parents.


  • Phone fully charged
  • Backup battery available
  • Clear storage for video recording
  • Lock screen set to PIN (not biometrics)
  • Know how to quickly lock your phone (power button 5x on iPhone)
  • Sensitive apps behind additional authentication
  • 2G disabled to prevent Stingray surveillance
  • SimpleX installed for anonymous coordination
  • Know how to power off quickly if needed
  • Keep phone powered off unless actively needed
  • Power on only to record or communicate
  • Power off immediately after
  • If you feel unsafe, turn it off — This forces passcode on restart
  • Turn it OFF immediately — This requires passcode to access
  • Do NOT unlock it
  • Say “I do not consent to a search”
  • Your PIN is legally protected (biometrics may not be)
  • A powered-off phone is significantly harder to extract data from
  • Consider giving phone to trusted person before potential arrest