Shared December 19, 2019
This is an ultimate security guide for mobile devices, both iOS and Android. Learn how to improve your smartphone security and protect your mobile phone and your private data.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Essential security tools and tips
Encrypt your phone
iOS & Android https://nakedsecurity.sophos.com/2015...
Find My Device
Google Authenticator https://play.google.com/store/apps/de... or App Store https://apps.apple.com/us/app/google-...
AndOTP https://play.google.com/store/apps/de... or F-Droid https://f-droid.org/en/packages/org.s...
Tor Browser for Android: https://play.google.com/store/apps/de...
Onion Browser for iOS: https://apps.apple.com/us/app/onion-b...
Encrypt backups, cloud and sync
iTunes encryption https://support.apple.com/en-us/HT205220
Firefox Focus https://support.mozilla.org/en-US/kb/...
Brave Browser https://brave.com/
HTTPS Everywhere https://www.eff.org/https-everywhere
uBlock Origin https://github.com/gorhill/uBlock/
Music by CO.AG Music https://www.youtube.com/channel/UCcav...
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
How to secure your online accounts
Kevin Mitnick Sample Speaking Clips and Hacks You'll See Live
The Best VPN in 2020? Ultimate VPN Comparison
Edward Snowden: How Your Cell Phone Spies on You
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
Scamming the Scammers - How to Handle Fake Tech Support Calls
Google vs DuckDuckGo | Search engine manipulation, censorship and why you should switch
Linux File System/Structure Explained!
"The truth about mobile phone and wireless radiation" -- Dr Devra Davis
DEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the Spam
Top 10 Gadgets Every White & Black Hat Hacker Use & Needs In Their Toolkit
How to secure your network | Tutorial | Wi-Fi security guide
Libra - Zuckerberg's dangerous cryptocurrency lie
How to protect your online privacy in 2019 | Tutorial
The truth about Virtual Private Networks - Should you use a VPN?
The Microsoft Windows _NSAKEY backdoor