If you want to attend a protest, you have to become unidentifiable. This is how you do it.
Become a producer of independent research and analysis by joining my Patreon page: [ Ссылка ]
Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live.
Your phone has four main radio signals, all of which can compromise your security:
• Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts.
• WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time.
• Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload.
• GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone.
Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable.
What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical security. Make sure to follow and understand every step in both of these parts as they are both equally required to remain anonymous.
Sources
EFF's guide on attending a protest: [ Ссылка ]
IMSI Catchers: [ Ссылка ]
- Stingrays: [ Ссылка ]
- [ Ссылка ]
How to prepare your phone for a protest: [ Ссылка ]
Protest privacy - photos: [ Ссылка ]
Burner Phone tutorial by The Intercept: [ Ссылка ]
Rogue WIFI hotspots: [ Ссылка ]
Dataminers spy on social media: [ Ссылка ]
Anonymous Twitter account: [ Ссылка ]
Facial recognition in Hong Kong protest: [ Ссылка ]
List of all apps and services mentioned (no affiliation)
GrapheneOS: [ Ссылка ]
- Download: [ Ссылка ]
- Install: [ Ссылка ]
F-Droid: [ Ссылка ]
Orbot: [ Ссылка ]
Tor Browser: [ Ссылка ]
Aurora Store: [ Ссылка ]
KeepassDX: [ Ссылка ]
Tutanota: [ Ссылка ]
Protonmail: [ Ссылка ]
SimpleLogin: [ Ссылка ]
Aegis Authenticator: [ Ссылка ]
Signal: [ Ссылка ]
Briar: [ Ссылка ]
Wire: [ Ссылка ]
Anonymous Twitter: [ Ссылка ]
Scrambled Exif: [ Ссылка ]
ImagePipe: [ Ссылка ]
ObscuraCam: [ Ссылка ]
OsmAnd: [ Ссылка ]
Credits
Music By: White Bat Audio [ Ссылка ]
Follow me:
[ Ссылка ]_
[ Ссылка ]
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
![](https://s2.save4k.ru/pic/vMJH-UJyENs/maxresdefault.jpg)