nothing more to add

  • SamotsvetyVIA [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    6 days ago

    who are you protecting against and what are you protecting. eg. 1) your phone comms - read about the hacks and backdoors in ios and android phones (especially those published by kaspersky) etc. then decide on how to mitigate it. tossing the phone altogether if the threat is the state or something. 2) posting publicly - identity construction, typing analysis blah blah