The protester's guide to smartphone security
Cell Networks, Stingrays, and Power Drain
- Discussion of “stingray” fake base stations: concern about downgrading to 2G and tracking devices; some phones don’t allow disabling 2G.
- Pixels and some Androids now integrate detection of fake base stations; third‑party apps also exist.
- Several participants suggest towers or stingrays can force higher transmit power, rapidly draining batteries and degrading coordination; others argue crowds and weak signal already cause similar drain without any special action.
- Airplane mode is no longer trusted on all devices (e.g., some still keep Wi‑Fi/Bluetooth active).
Offline / P2P Tools and Radios
- Briar (Android) is repeatedly recommended for P2P, Tor‑based, protest‑oriented messaging; iOS is seen as lacking mature, offline P2P options.
- Other tools mentioned: Cwtch, Berty (stability questioned), Matrix/Simplex (if self‑hosted), and Meshtastic (LoRa‑based, encrypted text over cheap hardware).
- Concerns: Bluetooth/Wi‑Fi P2P can still be tracked via MACs, side devices (earbuds, watches), and RF fingerprints.
- Encrypted walkie‑talkies exist but are expensive and often illegal or restricted on common US bands; some argue using illegal comms invites extra charges and undermines “peaceful protest” framing.
Burner Phones and SIM Anonymity
- Some argue burners are obsolete: movement patterns, tower logs, and unusual usage patterns can still tie them to you.
- Others say they still reduce risk if:
- bought with cash away from cameras,
- used only at the protest,
- never powered on near your main phone.
- Debate over whether strict burner playbooks now make you stand out in modern data sets.
- SIM registration laws vary by country; in some EU states anonymous prepaid SIMs are still sold.
Legal Access, Biometrics, and Wiping
- In some jurisdictions (e.g., UK) people can be compelled to reveal PINs; in parts of the US, compelled biometrics are more permissible than compelled passwords.
- iOS features: erase‑after‑10‑failed‑PIN, requiring eye contact for Face ID, and emergency sequences that disable biometrics. Reports of these sometimes failing in practice.
- Remote wiping or revoking account access while a device is in police hands may trigger obstruction or evidence‑destruction charges; intent is key but hard to litigate.
- GrapheneOS duress PINs and full‑disk encryption on niche phones (PinePhone, Purism) are discussed but seen as niche/expensive.
Phones, Cameras, and Documentation
- Strong faction: best security is leaving your personal phone at home; meet via pre‑arranged points, or use simple cameras or old feature phones.
- Counterpoint: phones enable livestreaming and rapid off‑device backups, critical for documenting abuses before devices are seized or destroyed.
- Debate about photographing identifiable protesters:
- One side: faces should be avoided to prevent doxxing/retaliation.
- Other side: documenting provocateurs and violent actors is important, and the state is filming anyway, so marginal risk is low.
Limits of Security and Protest Context
- Broad agreement that you can’t fully evade a determined state: face recognition, movement data, purchases, and social graphs still link people to events.
- View 1: given rubber‑hose tactics and powerful agencies, many “opsec” steps are theater.
- View 2: even partial hardening meaningfully reduces dragnet exposure to local police and low‑effort surveillance; tradeoffs should be chosen consciously.
- Discussion of how legality, morality, and protest tactics diverge: peaceful protests can still be repressed, and “legal vs illegal” can flip with politics. Some reference foreign influence and provocateurs but others demand stronger evidence.