Changing the Threat Footprint of a Phone in Emergencies

Streamed on:
5.09K

Phones are exposed to threats from 3-Letter Agencies, Hackers, Carriers, and Big Tech. But if you understand how each threat connects to the device, then you can control some of these in short term scenarios. Obviously when you have to use the phone normally you have to enable certain features but you have more flexibility than you think.

This is a more detailed view which is the next step to my recent video on phone spyware.

Loading 10 comments...