How dangerous is a smartphone for human health?

“How did you live before without mobile phones?!” – sometimes we are perplexed. It is no longer possible to imagine an ordinary working day without the treasured pipe. And for some, cellular communications are generally the only way to access the outside world. Moreover, falling rates allow you to chat with your friends for almost hours. All the advantages are obvious, if not for alarming statements about the dangers of using cell phones and other devices that operate on the basis of electromagnetic radiation. Are such fears justified? Is there any way to protect yourself from danger?

Electromagnetic radiation power. There is an established maximum permissible radiation limit for a telephone, the so-called SAR (specific absorption rate of electromagnetic radiation by the human body). This standard may differ slightly in different countries, for example, in Europe the SAR is 2.0 W/kg. Most modern phone models have an SAR of 0.5–1.0 W/kg. Some manufacturers indicate the SAR for a specific model in the instructions, because a low SAR indicator characterizes this model as the most conditionally safe.

If the power emitted by a phone exceeds SAR standards, then the manufacturer simply will not receive a license to manufacture and sell the proposed model. So, in the case of the permissible power of electromagnetic radiation, responsibility lies entirely with the manufacturer and the authorities issuing the certificate of conformity. Well, the consumer can look at the technical data sheet of the phone to inquire about its compliance with SAR standards.

Distance. The nature of the electromagnetic waves emitted by a cell phone is such that it is capable of “heating” water and, accordingly, everything that contains it. Scientists' concerns are based on the fact that the brain and other organs also contain water and its various compounds. This means that they can also heat up when exposed to electromagnetic waves.

However, it is possible to reduce the adverse effects during a conversation, for example, by increasing the distance from the head to the phone. Moreover, even a slight increase in this distance - from one millimeter to two - can significantly reduce the flux density of electromagnetic waves! Therefore, try not to press the phone to your ear. It’s even better to switch to using a Bluetooth headset, which will minimize the adverse effects of electromagnetic waves on the brain during a conversation.

To protect other organs, it is advisable not to carry your phone close to your body, such as in your chest or pants pocket. When the phone is idle, the power flow is very low, but when a call is received, it increases significantly, albeit for a short time.

Duration. Remember how a few years ago, when calling a mobile phone, we were in a hurry to tell the essence? Yes, until quite recently, calls on the “hundredth” were expensive, and therefore this means of communication was used only for short phrases. Now everything has changed: cellular operators provide opportunities for very long communications. However, this attractive coin does have a downside.

Have you noticed how your phone gets warm after a long conversation? Frankly, I thought that the tube was heating up from the heat that comes from my body. In fact, heating is largely due to the operation of the transmitter, which supplies heating impulses to the tissues of our brain. It is generally accepted that overheating within 1°C is safe for the brain. Overheating of brain tissue when using a cell phone rarely exceeds 0.3°C. However, there is still no data on the safety of systematic and prolonged exposure to such overloads. Therefore, it is wise to avoid long telephone conversations.

This effect is especially undesirable for children, since their body does not yet have high resistance. This is why it is believed that the use of a mobile phone by children under 16 years of age should be kept to the bare minimum. The situation is similar with pregnant women. The developing organs of the fetus can be negatively affected by something that does not pose a threat to an adult.

However, even some adults are extremely sensitive to the effects of electromagnetic waves. For example, they may experience headaches after talking on a cell phone for a long time. As you know, pain is a signal, in our case, a signal to reduce such practice.

So, as we see, it is entirely within our power to reduce the danger from using a cell phone. It’s just that, as in the case of other equipment, you need to take certain precautions, which, however, are relevant not only in light of the influence of electromagnetic waves.

Phone addiction

One day an interesting fellow traveler was traveling with me on the train. I didn’t immediately notice that she was wearing headphones, so it seemed like she was saying the lines to herself. After some time it became clear that she was communicating by phone. It would seem that the situation was ordinary, if not for two circumstances: the conversation lasted for many hours and was not interrupted even during meals, and the conversation itself was of a collective nature. That is, the girl periodically asked: “What are you doing now? Mmmm... And I’m eating” or “And now I’m looking out the window.”

Interestingly, long, reasonless conversations are classified by experts as a manifestation of telephone addiction. Some believe that telephone addiction is gaining global epidemic proportions and serves as compensation for a person with low self-esteem or other manifestations of psychological instability.

Also included in the category of telephone addiction is an irresistible craving for making calls, sending SMS, frequently changing phone models, and a pathological fear of missing any call. Young people are more often susceptible to this, both due to psychological characteristics and because they have not been taught the culture of using a telephone.

Phone culture

Once, as an observer at a trial, I witnessed how the judge interrupted the reading of the verdict in order to answer the phone. I thought, “It’s good that surgeons don’t bring phones into the operating room.” Needless to say, having a cell phone, a person becomes accessible almost any time and anywhere.

However, while focusing on the benefits, we may inadvertently forget about the so-called etiquette of using a phone, thereby causing inconvenience or even harm to others. For example, a switched-on phone can affect the operation of medical equipment, sound amplification equipment, and aircraft sensors. Talking on the phone for a long time or loudly in the presence of strangers can be perceived by others as a lack of respect.

The most undesirable consequences of talking on the phone occur while driving. Arrogance encourages you to think that while talking on the phone, concentration on the road remains at a high level. As you know, you can even pay for such a delusion with your life – your own or someone else’s.

Is a microwave oven dangerous?

The debate about this household appliance is no less heated than that surrounding a cell phone. Obviously, scientists still have a lot to learn about the effects of electromagnetic waves. Therefore, it is difficult to say anything categorically. Conventionally, the operating principle of a “microwave” is based on the ability of electromagnetic waves to heat water.

Accordingly, for safe operation, almost the same rules apply as when using a mobile phone. That is, it is preferable to operate the microwave oven for a short time, and during this process it is better to move away from it, and it is advisable for children to be in another room altogether. One of the most important conditions for the safe operation of a microwave oven is its tightness.

Sometimes, wanting to demonstrate the absolute quality of the stove, they ask you to put a cell phone in it and call it with the door closed. If the phone is unreachable, then we can assume that the oven is sealed. However, such verification is somewhat arbitrary and cannot guarantee absolute quality. Therefore, we, consumers, need to be extremely vigilant when interacting with modern devices, the operation of which is based on the nature of electromagnetic waves. Health to you in the era of technological progress!

With the advent of the crisis on the Russian market, prices for smartphones, and indeed for all equipment, began to bite. For many, the way out of this situation was the so-called « gray » smartphones. How safe, legal and convenient it is, read more in our article!

What's happened « gray » smartphones

Large smartphone manufacturers rarely limit themselves to one market for selling their products. Devices from brands such as Samsung, Xiaomi, ZTE, Meizu, Lenovo can be found in many countries in Europe, Asia and the countries of the Customs Union. « Gray » a smartphone means that the product was imported into your country illegally, that no customs duties were paid for it, and the manufacturer does not provide its official guarantee.

Initially, this smartphone could have been intended for sale in Europe or Asia, but thanks to the cunning of entrepreneurs and holes in the legislation, it can be purchased in our country, and much cheaper than from an official dealer.

We also note that certification « growth » absolutely does not mean that the device has been tested and studied by a group of scientists using various equipment and found to be absolutely safe. As a rule, this is a simple formality, and the certification center checks the product for the presence of Russian-language software, instructions, and for compliance with the declared and actual characteristics.

Example prices at the time of writing:

Xiaomi Redmi Note 4 32GB (black) — RUB 14,999 on the liaison website.

Xiaomi Redmi Note 4 32GB (Black) — 9790 RUR in one of the Yandex.Market stores.

The overpayment is simply huge - 50%, but in fact, the devices are absolutely identical.

A few words about the PCT

Many people still ask the seller about the treasured three letters when choosing a smartphone « PCT » . The fact is that PCT, recently, is not a mandatory certification, but a voluntary one. It no longer affects anything and does not oblige you to anything. With the advent of the Eurasian Economic Union, mandatory certification since August 2013 is called EAC ( Eurasian correspondence). Therefore, if the seller answers in the affirmative to the question whether the device is PCT, this means that the device is still EAC, and the seller is too lazy to explain all these subtleties to you, but yes, it has passed certification. Therefore, it is best to ask if the device has an official warranty from the manufacturer, this way you will save time.

Is this legal

Absolutely legal. The seller can sell and you can buy « grey » phone as much as you like. We have no laws prohibiting you from doing this. No one will confiscate your devices. Smartphones are not included in the list of devices that are subject to mandatory certification.

How safe is it?

If purchased « gray » The device is not a fake, but an original, then there is no difference between it and the same model for the Russian market. Here you can rather speculate on how safe cell phones are in principle. There are many videos on YouTube about iPhones spontaneously combusting, and the explosive Samsung Note 7 has become a meme.

What are the differences?

First of all, you need to find out for which market the device was originally intended. If the device is for Asia, then you will need an adapter plug for Russian sockets and the packaging will have hieroglyphs. If for Europe, then the adapter most likely will not be needed, and the packaging will have inscriptions in English. The name of the smartphone will contain the symbols EU, which means European Union.

You should also study the model you choose. The fact is that in China you can find a Lenovo P2 model with 64GB of internal memory, and on the Russian market this model appeared with a maximum of 32GB of memory on board. Some Xiaomi models are released in Europe with support for LTE frequencies Band 20. In China there is no support for this frequency, and therefore LTE in Russia will work worse. By the way, no "e vrotest » does not exist, by this the sellers want to say that the device is not certified for Russia, and they hope that the buyer will have a kind of trigger for the “Euro” prefix. Examples of this are words such as European-quality repair, European-quality, European-standard.

How to check certification

If the seller claims that the device « growth » , but something confuses you, then this information can be easily checked. To do this, you need to call the manufacturer’s hotline and give the IMEI of the device.

IMEI is a unique gadget identifier. This is something like a license plate on a car - a very rough analogy, but in principle it fits. It can be found on the packaging or on the smartphone itself if you type the command *#06#.

Some manufacturers also provide an online database for checking, but it is better not to trust such databases, because the information there is not updated often. Also, the device, of course, must come with a charger without any adapters, with information in Russian on the box and with fully Russified firmware. It is best when the device is sealed and unpacking happens in front of you.

It is very difficult to distinguish a fake smartphone from an original one if you have not seen the original. Externally, the smartphones will look very similar. Here are two pieces of advice:

1) If you have already chosen a specific model, then it is advisable to look at the reviews and remember how and what it should look like externally. Better yet, save the pictures and compare them when purchasing.

2) stock up on the free CPU-Z program. It will demonstrate what hardware is installed on the smartphone. The program also has a useful function Online Validation In chapter About. By clicking there you will need to enter your name and email optionally. After this, the program will compare the hardware of your device with that declared by the manufacturer. My Xiaomi Mi Max has passed the test, as evidenced by the green seal. Although the device was not tested on the official website at the time of purchase.

Firmware

Devices « growth » (EAS) always come with Russian. But if you buy « grey » gadget, it is advisable to check with the seller what firmware it contains. Most uncertified devices are sold with so-called global (international) firmware, but they may also have Chinese Russified firmware, especially if the model is new.

There are no questions about international firmware. They, as a rule, are updated, the Russian language does not disappear in them, and 4G works with all networks. Chinese firmware may not be updated, or updated depriving the user of the Russian language. They may also have various glitches and bugs and it is not a fact that LTE works. A very unpleasant aspect of such firmware is that when resetting the settings, Chinese may appear.

When buying a gray smartphone, be sure to pay attention to the firmware. And if the model is new, then it is better to wait for the release of the international firmware and buy it right away.

Important point. The phone must be without, otherwise online banking will not work, which is not very convenient.

Is it worth buying a non-Rostest smartphone?

It is difficult to answer this question unambiguously. If you are an experienced user and have studied this issue, then of course yes. For those who don't know what it is recovery, global And band We can also recommend such a device, the main thing is that it has good international firmware.

And it is very important to buy from a good and trusted store, because only the store provides a guarantee for such smartphones. Purchase « gray » Buying a smartphone from an unverified seller is a risk, and if something happens, it will be difficult or even impossible for you to repair the smartphone under warranty.

All mobile phones support voice and text communication. And these days, most devices can do much more. Mobile phones have become an integral part of everyday life, largely due to their portability, versatility and relatively low cost. The same qualities make them valuable to human rights defenders, who often use smartphones to share sensitive data and store sensitive information in ways that were previously common on secure computers.

Our guide is primarily dedicated to smartphones, devices Android And iOS with mobile communication functions, with the possibility of voice and text communications, often with Internet access. The list of smartphone functions is constantly growing: cameras, digital data storage, motion sensors, geo-navigation receivers (GPS), wi-fi, easy access to a motley collection of applications. A significant portion of this guide may also apply to other mobile devices, e.g. feature phones(regular old-fashioned mobile devices) and tablets. The latter are often large, high-power smartphones, although they do not support mobile communications functions.

What will you learn from this guide?

  • Important data is becoming more portable - what to do about the risks
  • Why mobile voice and text communications are especially vulnerable to surveillance
  • What steps should you take to improve the security of your smartphone when transferring and storing data, taking photographs, visiting websites, etc.
  • How to increase your chances of remaining anonymous (if necessary)

General information about mobile phones

Smartphones are one of the most powerful technologies available to most people. These devices are stuffed with various sensors, are almost always at hand, and are usually connected to one or another network. In general, there are most of the security threats we typically associate with computers, plus a whole host of additional concerns that arise from portability, feature-richness, insecure network architecture, location tracking, image capture, and so on.

OS

Most smartphones run on two operating systems: Google Android and Apple iOS. A variety of companies sell Android devices. Their software is often changed by developers and service providers. They hope, and sometimes demand, that device owners work in their mobile networks (and paid, of course). The iOS operating system only works on Apple devices. It seriously makes it difficult to launch applications that have not been approved Apple.

One of the main factors affecting the security of an Android smartphone is regular operating system updates. Some cheaper models don't have access to updates, so they can't fix serious security bugs. This can leave you vulnerable to malicious code and a variety of attacks.

Branded and locked smartphones

Smartphones are often sold locked. This means that the device can only work in the network of a specific telecom operator. (Only with a SIM card from this operator). The operator often changes the operating system and installs additional applications on a locked phone. In addition, the operator can disable some features. The result is apps that cannot be removed or denied access to data, including your contacts and stored information.

Therefore, it is safer to buy a regular, unlocked smartphone, without being tied to a telecom operator. Unfortunately, such smartphones are usually more expensive.

Basic Security Settings

Your smartphone has many settings that you can use to control the security of your device. It is important to know these settings. You can read more about some Android settings and apps in this guide:

Installing, checking and updating applications

The simplest (and usually safest) way to install an application on a smartphone is to use Google Play for Android or App Store for iOS. Log in to your account on the device - and you can download and install applications.

Android apps are available online in many places, but our default advice is to not install apps from anywhere. Some of them contain malicious code. You can read more about malware in the guide on how to protect your devices from viruses and phishing. Install applications only from sources you trust. Be aware that trusted individuals may unintentionally distribute malicious code without knowing it. Apps on Google Play and the App Store are subject to some review by Google and Apple, respectively. This provides some protection against outright malicious applications.

There's also a solution for experienced Android users - or those who don't want or can't use Google Play. This F-Droid, an alternative selection of programs that only contains FOSS-applications. If you need access to F-Droid, you can install the corresponding application from a trusted source and then use it to install other applications. You can also install applications directly from files .apk (Android packages), if you enable the function installing unknown applications. Yes, it's risky, but if you have no other way to install the app you want, you can ask someone you trust to give you .apk-file on the memory card.

Even "official" apps behave badly sometimes. On Android devices, each application asks permission to perform certain actions. You should pay attention to exactly what permissions programs ask for. If it's something illogical, check the reasons and consider not giving permission and deleting the app. If you wanted to install a news reader app and it asks you to allow it to send your contacts over the network to a third party, there is cause for concern. (Some developers collect contact lists for sale or self-use for marketing purposes.)

Try to update apps promptly and remove those you don't use. The developer can sell his creation to other people, and they will modify the application that you already have installed and add malicious code to it.

Mobility and data vulnerability

The mobile phones we carry with us everywhere often contain important information. Call history, browser browsing history, text and voice messages, address books, calendars, photos and other useful things can lead to a chain of troubles if the device on which they were stored is lost or stolen. You need to know where important information is located on your mobile phone, as well as online data that you can automatically access. This data can fuel a threat against not only the owner of the device, but also everyone who ends up in the address book, in incoming messages or in a photo album.

So you've thought through the risks and become familiar with the security and privacy features of your device. It's time to start taking protective measures.

We store information on a smartphone

Modern smartphones have a lot of storage space. It may be easy for someone with physical access to the device to retrieve this information. (Of course, this also depends on the device itself).

Encrypting the device and data on it

Modern iOS devices have strong encryption enabled by default (of course, you must set a strong password). Android also supports device encryption, and you can usually turn it on. Don't forget to back up your smartphone data before encrypting the entire device. This will come in handy if any problem arises during the encryption process.

Android also allows you to encrypt data on memory cards (for example, microSD), if you use them.

When you turn on an encrypted phone and enter the password, you gain access to read and change data on the device. Anyone who has physical access to your phone when it is turned on and unlocked can get to your data. To be more confident - for example, before crossing a border or going through airport security - it is better to turn off the device completely.

Of course, there are not only pros, but also cons. For example, if you think you might need to make an urgent call, it might be better to leave your phone on and simply lock the screen.

If you can't completely encrypt your device (or need extra security for individual files), try installing an encryption app. Some applications encrypt their own data, and, for example, OpenKeychain allows you to encrypt third-party files. Using this application together with the program K-9 Mail, you can send and receive encrypted messages. (There are no analogues to this on iOS). Apps like these can help protect valuable information, but you should still consider encrypting your device.

It makes sense to minimize the amount of valuable data you store on your device, especially if it's not encrypted. Some phones have a feature that allows you not to store the history of calls and SMS messages. You can get into the habit of deleting important data from your call and message history.

Secure password storage

Passwords can be stored in a single encrypted file if you install the FOSS application KeePassDroid. The only one in this application, but very reliable master password used for protection all others passwords. Those, in turn, can be very long and unique for all accounts, and there is no need to remember them. KeePassDroid has a built-in password generator, which is convenient to use when creating new accounts.

If you use KeePassXC or KeePassX on your computer, as described in the guide on creating and storing strong passwords, you can copy your database (file .kdbx) to a mobile device.

There is a similar app for iOS called MiniKeePass.

The first step to protecting information on your mobile phone is to restrict access to the device. You should keep it on at all times, except in situations where there are special risks. This applies to both SIM cards and memory cards. Even if you are wary of viruses or advanced surveillance, it may be safer to remove the battery and keep the smartphone with you instead of leaving your device unattended.

So, enable encryption and keep your smartphone with you. What else can you do to physically secure your mobile device and reduce damage if it is lost or stolen?

Basic Steps

    Always use a strong screen lock code and try not to give it to anyone. If you have a simple phone with a default code, change the code.

    You should not store important information, including phone numbers, on a SIM card because they cannot be encrypted there.

    Back up important phone data periodically. Save them to your computer or external storage device. Keep backups in a safe place, as we discussed in the chapter on protecting important files on your computer. If you have a backup, it's easier to remember what information was on the phone and, if necessary, return to factory settings.

    Phone numbers are often linked to important accounts. An attacker may need your phone to gain access to these accounts or to impersonate you. Some mobile operators allow the client to protect their account with a PIN code or password to prevent anyone from making changes to the account or stealing the phone number. If such a feature is available, use it.

    Worried about malicious code? Perhaps there is value in a small sticker that will temporarily cover the phone's camera.

About loss and theft

    Mobile devices have a 15-digit International Mobile Equipment Identity (IMEI). This code allows you to identify the device on the network. Changing the SIM card does not change the IMEI. The code is often written underneath the removable battery. Most phones will show the IMEI in settings and/or when prompted for *#06# . Write down the IMEI. He can help you prove that you are indeed the owner of the stolen phone.

    Think about the pros and cons of registering your phone with a carrier. If you report your phone missing, your carrier usually has the ability to disconnect the phone. However, registering your device further ties your identity to your phone.

    Most Android phones and iPhones have a built-in Find My Phone feature. It allows you to track or disable the device in case of theft. There are independent software developments for the same purpose. Tools like this come with a trade-off, but if you trust the service owner and his software, you can try this option.

What to do if you need to transfer the device to another person

    When you throw away your unwanted phone, give it away or sell it to someone, make sure it doesn't contain information that would normally be stored on a SIM card or memory card. This advice is relevant even if the device has not been turned on for a long time or does not work at all. You can get rid of a SIM card by physically destroying it. Remove the memory card from the device and either destroy it or store it securely. The best way to protect the data on your phone is to make sure it is encrypted and then reset the device to factory settings.

    Use only stores and repair shops you trust. This will reduce the vulnerability of your data when you buy a used device or take your device in for repair. If you think someone might have the resources, access or motivation to harass you and install malicious code to that end (before you buy the phone), try randomly selecting one of the authorized dealers.

    If you send your phone for repair, remove the SIM card and memory card.

Mobile infrastructure, surveillance and eavesdropping

Mobile phones and cellular networks are even less secure than commonly believed. To send and receive voice and text messages, your phone is always in touch with the nearest cell tower. This way the carrier knows - and records - the location of the phone when it is turned on.

Interception of calls and text messages

Mobile networks are usually privately owned by commercial companies. Sometimes the entire mobile network infrastructure belongs to the telecom operator itself. It happens that the operator resells mobile communications that it rents from another company. SMS text messages are not encrypted. Voice communications are not encrypted or are only weakly encrypted. Both types of communications are not protected from control within the network itself. As a result, both your carrier and the cell tower owner have unlimited access to your calls, text messages, and location data. The government, in many cases, also gains this access, even when it does not own the infrastructure itself.

Many countries have laws and regulations that require telecom operators to record and store customers' SMS messages. Most operators, however, do this anyway for the sake of their business objectives, reporting and resolving possible conflicts. Some countries have similar rules for voice communications.

Moreover, the operating system that is installed on a mobile phone may well have been originally designed or modified for a specific telecom operator. Accordingly, the operating system itself may contain hidden functions that make monitoring even more penetrating. This applies to both simple mobile phones and smartphones.

Third parties may also sometimes intercept voice and text communications. For example, an attacker could use an inexpensive device called IMSI catcher. If such a device is placed in the reception area of ​​a mobile phone, it may mistake the “catcher” for a real cell phone tower. (Sometimes "IMSI catchers" are called Stingrays- a name known among experts, under which these devices are positioned on the market for the needs of law enforcement agencies). In several cases, third parties have even managed to gain access to mobile network resources while being on the other side of the globe. They exploited vulnerabilities in alarm system 7 (Signalling System Number 7, SS7), a set of protocols for the international exchange of voice and SMS messages.

Finally, even if you connect to the Internet via Wi-Fi rather than cellular, operating systems on smartphones and tablets encourage users to share their personal data on social networks and cloud storage; people are encouraged to actively use global geonavigation (GPS) and other similar functions. Many Android and iOS fans like this, and personal data has a greater chance of being leaked online.

Want to protect your most important communications? To get started, ask yourself a few questions:

  • With whom, when and how often do you communicate?
  • Who else might be interested in knowing that you are communicating with this person?
  • How confident are you that your interlocutor is who he says he is?
  • What is the content of your calls and messages?
  • Who else might be interested in this content?
  • Where do you get in touch from, where is your interlocutor located?

If the answers to these questions give you security concerns, you should consider minimizing the risks involved. To do this, you may have to help your interlocutor master a new technology or program. In some situations, it may be better to avoid using your cell phone as a means of communication.

Anonymity

Protecting the content of calls and messages can be challenging. It is even more difficult to remain anonymous when using a mobile phone. In particular, it is rarely possible to hide the fact that you are communicating with a specific person when you make a call or send an SMS. You can use a secure messenger with an Internet connection via a mobile network or Wi-Fi, but how can you guarantee success? Most often, the most that can be done is to choose which exactly from a third party will be able to access the information, and hope that this party will not closely cooperate with those from whom you want to protect your communications.

To increase the level of anonymity, people sometimes prefer burner phones and short-term accounts. This works in some situations, but getting everything right is not that easy. The simplest choice for both sides of the process is to buy prepaid phones, use them for voice calls and SMS messages for a very short time, then destroy them. However, the data cannot be encrypted. The effectiveness of this method depends on a fairly long list of conditions. Here are some:

  • Both parties buy phones and SIM cards in cash.
  • When they do this, no one tracks them by hereby phones.
  • They activate SIM cards without presenting documents.
  • They remove batteries from phones when they are not in use.
  • They can exchange phone numbers without attracting too much attention.
  • They use their phones in places where they don't usually spend time.
  • When they go to places where they usually spend time, they don't take their phones there.
  • Voice recognition technologies are not exceeding our expectations.

If all of the above conditions for a prepaid smartphone are met, you can try to hide the connection between the two parties by making encrypted calls. But to do this effectively requires even more care and attention, in part because smartphones and secure data sharing apps require account registration. There's little point in using an "undetectable" phone to access services that are already tied to your identity. You can create anonymous email accounts and “disposable” accounts in other services, but this takes time and requires concentration. Both parties need to understand what IP addresses are, browser fingerprints, how to use Tor Browser or Tails, to name a few. They will have to spend extra time and money at randomly selected internet cafes without using actual phones.

Listening

The phone can be configured to store or transmit data received from a microphone, camera or GPS receiver - and the owner will not know about it (applies to both a simple mobile phone and a smartphone). Most of these attacks involve malware, but it cannot be ruled out that telecom operators may be involved in similar surveillance of devices connected to their networks. Some phones can even be turned on remotely and made to spy on their owners, although they will appear to be turned off.

    If you don't trust the person, don't give them access to your phone. (Breaking this rule is a common reason why malware gets onto our devices.)

    Please note: Using a mobile phone in public or in a place that you believe may be under surveillance makes you vulnerable to traditional eavesdropping techniques. In addition, the risk of your phone being stolen increases.

    Encourage those with whom you communicate on important issues to start using the same programs and techniques that you use yourself.

    Having a private, personal meeting? Turn off the phone, remove the battery. So as not to reveal place meeting, it is better to do this before you go to the meeting. If you can't disconnect the battery, just leave the phone somewhere safe.

Internet via mobile phone

The user ID in Signal is (for simplicity) your mobile phone number. Unfortunately, this means you won't be able to use Signal without a valid mobile phone number, even if you prefer wi-fi. Additionally, if you want to contact someone on Signal, you'll have to give that person your phone number. Those for whom this is a problem can pay attention to other messengers with a “good reputation”, for example, Wire(Android, iOS).

Answers to the following questions will help you choose a mobile messenger:

  • What do digital security experts say about it?
  • Is this a free program? Open source?
  • Does it support end-to-end encryption between two users?
  • Does it support end-to-end encryption in group text chat?
  • Does it support end-to-end encryption for group voice communications?
  • Does end-to-end encryption protect transferred files?
  • Is it possible to set messages to "self-destruct after reading"?
  • Will the program work on a slow Internet connection?
  • Who is the developer of the application, should you trust him?
  • Who is the owner of the server, what is its policy regarding the storage of calls and messages?
  • Can you use one account on multiple devices?
  • Are all major operating systems supported?
  • Is it possible to use an email address and username to register rather than a phone number (which will separate your account from your real identity)?
  • Is it possible to use the messenger without giving it access to the contacts on the device?
  • Can it be used on a mobile device but not on a phone?
  • Can you (or someone you trust) run your own server and communicate through it?

Sending and receiving email on a smartphone

Are you going to read important email on your mobile device? Make sure encryption is turned on, as discussed in Android Security Basics. (On the latest iPhone models, encryption is turned on by default; the only important thing is to choose a strong password). This will not protect your mail all the way to the recipient, but it will prevent someone who tries to read it after losing/stolen a mobile device. You may find this guide helpful on how to keep your communications private.

This guide deals in particular with GPG-encryption of email on Windows, Mac and Linux computers. It is also possible to send and receive encrypted mail on Android devices, but not without difficulties. (There is currently no free GPG encryption for iOS).

Most security experts advise against storing your secret encryption key anywhere other than your main work computer. (Moreover, do not carry the key with you). However, you will need this key to read encrypted messages on your mobile device. Today, Android devices are more secure than they once were, and your private key is protected with a strong password. Thus, if you really necessary send and receive such important data on your Android device, and switching to a secure messenger does not suit you, you can install GPG on it.

To do this you need:

  1. Install and configure GPG and a key management application, for example, OpenKeychain .
  2. Copy your secret key to the device.
  3. Install and configure an email application that works with OpenKeychain, For example, K-9 Mail .

Not just calls and messages

Mobile phones are multifunctional devices, small computers with their own operating systems and downloadable applications. Mobile phones provide a variety of services. Much of what you do on a computer you can do on a smartphone today. And, of course, there are many things that you can do on a smartphone, but not on a computer.

Browsing Websites

Even the most basic mobile phones can't connect to the internet, but those are rare these days. If you use a browser on your Android device to browse, among other things, restricted websites, consider using a virtual private network (VPN) or app Orbot(Android versions of Tor Browser).

VPN on Android device

A VPN creates an encrypted tunnel from your device to a VPN server somewhere on the internet. VPN helps protect outgoing and incoming traffic. This is especially important if traffic passes through an insecure local or national network. However, since all traffic goes through the VPN provider, it can see everything that has now become inaccessible to view from the local network or the Internet access provider. It's important to choose a VPN service you trust and remember to use HTTPS when transferring valuable data.

In some countries, VPNs are illegal or have limited access. Find out what the situation is in the country where you plan to use the VPN. Remember that a VPN does not hide the fact that you are using a VPN.

To use a VPN, you will need to install a client application and create an account with the VPN provider. Riseup Team offers a free, open-source VPN client for Android called Bitmask and supports the free VPN service Riseup Black. (If you already have a Riseup Red account and know how to manually set up a VPN, you can use the app OpenVPN for Android(Play Store, F-Droid) with your username and password Riseup Red. (Application OpenVPN for Android free and open source).

Tor on an Android device

To have anonymous access to sites, you can use a couple of Android applications: Orbot And Orfox. Orbot routes Internet traffic through the anonymous Tor network. Orfox is a mobile version of Firefox that uses Orbot and provides additional protection for your privacy. Together, these two apps allow you to bypass online filters and visit websites anonymously, the same thing that gives Tor Browser for Windows, Mac and Linux.

You can learn more about anonymity and censorship circumvention in the corresponding guide.

Photo and recording

Smartphones allow you to take photos, record sound, and shoot video. These are all powerful tools for documenting events and disseminating information about them. The privacy and safety of those appearing on camera and in the recording must be respected. For example, if you recorded an important event, and then the phone fell into the wrong hands, this could lead to trouble for both you and the subjects of your report. Some tips on what to do to manage such risks:

  • Think about how you can securely and quickly upload recorded files online and delete them from your device.
  • Use tools to blur the faces of people in your photos and videos, and distort the voices of those you record.
  • Find out what programs and settings you can use to get rid of metadata in media files. Examples of such metadata are the GPS coordinates of the places where the photographs were taken, the parameters of the camera that was used to take the photo.

The Guardian Project has created and maintains a free, open-source app called ObscuraCam, which works with photos and videos to blur faces and remove metadata.

if you necessary save faces, voices and metadata, then it is especially important that your device is encrypted. Files that you copy from the device to somewhere else for storage or transfer should also be encrypted. Driven by this idea, programmers Guardian Project developed the Proof Mode application, antipode ObscuraCam. Proof Mode“pulls out” maximum metadata from the material, which can help establish the authenticity of an image or video. This metadata is stored separately from the corresponding images and videos; transmit them only through secure channels.

  • Connect your phone to your computer only if you are sure that there is no malicious code on the computer. For more information, see our guide to protecting your computer from viruses and phishing.
  • Just like with a computer, be careful when connecting to a wi-fi network without a password.
  • Turn off Wi-Fi, Bluetooth, and Near Field Communication (NFC) when not using these features. Enable them only when necessary and only to connect to trusted networks and devices. Whenever possible, use a cable to transfer data.
  • from The Intercept

If you are interested not only in the technical characteristics of the phone, but also think about its security, you will be interested to know about: which smartphone is the most secure?

Our friend from Spain shared with us an interesting infographic that was published by all Spanish technical magazines. It provides a rating of popular smartphones and their emission levels: from the lowest to the highest SAR.

Smartphone radiation level

It's surprising that the phone from our favorite company managed to take first place in this rating. But, unfortunately, this is not entirely good news.

What is SAR?

The phone's radiation level is characterized by the Specific Absorption Rate.

This indicator shows how much electromagnetic energy is absorbed in human tissues in one second.

Each smartphone, including Xiaomi devices, has its own SAR level (i.e. specific absorption power). By studying this data, you can understand how harmful a phone is for a person, and what impact it can have on his health.

As you can see in the image, the brands that top the list of unsafe mobile phones in terms of RF emissions are Xiaomi, OnePlus, Huawei, Nokia, Sony and ZTE. Yes, the Asian market, and especially the Chinese market, are the best. But it’s worrying that Xiaomi has become a leader in this ranking.

Xiaomi Mi A1 tops the list with 1.75 W/kg. The acceptable norm in Europe is up to 2 W/kg.

Then we have 5 popular mobile phones such as OnePlus 5T (1.68), Huawei Mate 9 (1.64), Nokia Lumia 630 (1.51) and in fifth place Huawei P9 Plus (1.48).

On the other hand, among safe phones that produce less radiation, the list is topped by the Japanese company Sony with its Xperia M5 model (0.14). Next comes the Samsung Galaxy Note 8 (0.17), Galaxy S6 Edge (0.22), Google Pixel XL (0.25) and fifth place Galaxy S8 Plus (0.26). The top 10 is completed by the Galaxy S7 Edge, ZTE BLADE A910, LG Q6, Galaxy A5 (2016) and Moto G5 Plus.

In the 2018 ranking, compiled based on the latest research, we see only one Xiaomi model. This is due to the fact that the Mi A1 is actively moving into the European market and is the most popular Xiaomi phone in Spain, which is why it was chosen when compiling the infographics, since the new product with stock Android became the leader in terms of SAR.

If you look at it as a whole, you can draw conclusions by studying the data for 2017.

Top 5 safest:

  • Mi 5,
  • Redmi 3 Pro,
  • Redmi Note 3 Pro,
  • Mi 5s,
  • Redmi 3S Prime.

Xiaomi Redmi 4x radiation is 1.49 W/kg.

Dear readers, are you worried about magnetic radiation from your phone? Do you think Mi A1 owners need to worry about the fact that the device is listed as having a high health risk?

How safe are new smartphones to use?

This is a very difficult question to answer: linking cell phone radiation to health problems is not easy, and isolating the user from the radiation is even more difficult.

While the industry is gradually eliminating the dangers of smartphone radiation over time, users should also take some precautions themselves. Especially since there are many studies linking the use of portable devices to all sorts of problems, including male infertility.

In the case of smartphones, there is one metric, SAR, that you can look at to roughly know the effect the device has on the human body. SAR stands for Specific Absorption Rate, and while it's an outdated standard (the test method was invented in 1996, before smartphones, and hasn't changed since), it does at least offer some measurement.

Smartphones with a higher SAR rating are considered potentially more dangerous, and all smartphones are tested so that the manufacturer can ensure their emissions are below a certain threshold. So which 2018 smartphones have the highest and which smartphones have the lowest SAR values? Let's take a look.

  • Apple iPhone XS Max: head: 1.00 W/kg, body: 1.00 W/kg
  • Apple iPhone XS: head: 0.90 W/kg, body: 0.99 W/kg
  • Apple iPhone XR: head: 0.90 W/kg, body: 1.10 W/kg
  • Samsung Galaxy Note 9: Head: 0.27 W/kg, Body: 0.76 W/kg
  • Samsung Galaxy S9 Plus: Head: 0.36 W/kg, Body: 0.79 W/kg
  • Samsung Galaxy S9: head: 0.35 W/kg, body: 0.96 W/kg
  • Google Pixel 3 XL: Head: 1.35 W/kg, Body: 1.19 W/kg
  • Google Pixel 3: Head: 1.34 W/kg, Body: 1.34 W/kg
  • LG V40: head: 1.27 W/kg, body: 1.28 W/kg
  • LG G7: head: 0.22 W/kg, body: 1.06 W/kg
  • OnePlus 6T: Head: 1.34 W/kg, Body: 1.19 W/kg
  • OnePlus 6: Head: 1.26 W/kg, Body: 0.90 W/kg
  • Xiaomi Pocophone F1: head: 0.72 W/kg, body: 0.75 W/kg
  • Sony Xperia XZ3: head: 0.14 W/kg, body: 0.44 W/kg

If you look at all these values, the Sony Xperia XZ3 is undoubtedly the winner in terms of the lowest specific absorption rate. In theory, this should mean the Xperia XZ3 is the safest smartphone for everyday use.

The Samsung Note 9, Galaxy S9 and Galaxy S9+ also have a very low head absorption rate, which is certainly reassuring.

The LG G7 is another smartphone that has a low SAR rating for head exposure, so those looking for the safest smartphones can consider it as one of their best options.

The 2018 Apple iPhone has much higher values, but they are, of course, still within the legal requirements.

As you noticed, the record holders of the list are smartphones from Google and OnePlus.

Are you concerned about radiation from your smartphone and have you noticed any impact of your smartphone on your body?