Home
|
Checklist
|
Handout
|
Flyer
DE
|
EN
|
ES
|
FR
Smartphone, don't spy!
✔ A checklist for your mobile security
Flyer: Smartphone, don't spy!
,
smartphone-dont-spy.de
,
(en)
Next cryptoparties at cryptoparty.in
,
cryptoparty.in
,
(en)
NO STALK App
,
nostalk.de
,
(de)
About privacy and Location Services in iOS, iPadOS, and watchOS
,
apple.com
,
(en)
SIM swap scam
,
wikipedia.org
,
(en)
F-Droid: Neo Backup
,
f-droid.org
,
(en)
MacOS: Encrypting and protecting a storage medium with a password using Disk Utility on the Mac
,
apple.com
,
(de)
VeraCrypt
,
veracrypt.fr
,
(en)
duplicity
,
duplicity.us
,
(en)
restic
,
restic.net
,
(en)
Wigle.net - All the networks. Found by Everyone.
,
wigle.net
,
(en)
Webcam ticker map TOP SECRET
,
bmfsfj.de
,
(de)
What is a Location Area?
,
de.wikipedia.org
,
(en)
Frequently asked questions: General and SINA connection
,
bundesnetzagentur.de
,
(de)
Was ist RRLP?
,
wikipedia.org
,
(en)
The emergency location service quickly provides precise location information
,
android.com
,
(de)
Location data for emergency call 112
,
ils-freiburg.de
,
(de)
Advanced Mobile Location
,
wikipedia.org
,
(de)
CalyxOS
,
calyxos.org
,
(en)
GrapheneOS
,
grapheneos.org
,
(en)
Diceware
,
wikipedia.org
,
(en)
Download F-Droid
,
f-droid.org
,
(en)
Download Aurora Store via F-Droid
,
f-droid.org
,
(en)
privascore.org - The data protection traffic light for digital data
,
privascore.org
,
(de)
εxodus - The privacy audit platform for Android applications
,
reports.exodus-privacy.eu.org
,
(en)
How To Get the DuckDuckGo App on Android
,
duckduckgo.com
,
(en)
Messenger matrix
,
messenger-matrix.de
,
(de)
Set and manage disappearing messages on Signal
,
signal.org
,
(en)
Automatically Tidy Up Threema Chats
,
threema.ch
,
(en)
Speaker authentication
,
wikipedia.org
,
(de)
What is zero-click malware and how does it work?
,
kaspersky.de
,
(de)
About Lockdown Mode
,
apple.com
,
(en)
FreeTubeAndroid
,
github.com
,
(en)
Invidious instances
,
docs.invidious.io
,
(en)
LibRedirect
,
libredirect.github.io
,
(en)
eBlocker
,
eblocker.org
,
(en)
Pi-hole
,
pi-hole.net
,
(en)
AdAway for Android
,
adaway.org
,
(en)
uBlock Origin for Firefox
,
mozilla.org
,
(en)
duckduckgo.com
,
duckduckgo.com
,
(en)
stract.com
,
stract.com
,
(en)
OpenKeychain: Easy PGP
,
f-droid.org
,
(en)
So aktivierst du den erweiterten Datenschutz für iCloud
,
apple.com
,
(en)
Harvest now, decrypt later
,
en.wikipedia.org
,
(en)
RiseupVPN
,
riseup.net
,
(en)
Imagepipe auf F-Droid
,
f-droid.org
,
(en)
have i been pwned?
,
haveibeenpwned.com
,
(en)
Phishing
,
wikipedia.org
,
(en)
Libretube
,
libretube.dev
,
(en)
Tubular
,
github.com
,
(en)
NewPipe
,
newpipe.net
,
(en)
Codeberg
,
codeberg.org
,
(en)
Donate for this project
,
liberapay.com
,
(en)
Help for victims of violence
,
weisser-ring.de
,
(de)
Women against violence .e.V.: Help & advice Local support services
,
aktiv-gegen-digitale-gewalt.de
,
(de)
The Federal Association of Women's Counseling Centers and Women's Emergency Calls
,
frauen-gegen-gewalt.de
,
(de)
Lock and unlock the bootloader
,
android.com
,
(en)
Bootloader unlocking
,
wikipedia.org
,
(en)
Léon – The URL Cleaner
,
f-droid.org
,
(en)
The Join Fediverse Wiki
,
joinfediverse.wiki
,
(en)
Let's find a Fediverse home
,
fediverse.observer
,
(de)
Explorer the fediverse map
,
fediverse.party
,
(en)
US government chat: this could also happen in Germany
,
zeit.de
,
(de)
How to Enter the US With Your Digital Privacy Intact
,
wired.com
,
(en)
SS7: Locate. Track. Manipulate
,
media.ccc.de
,
(en)
, 2014-12-28
Computer science expertise: One phone number is enough to hit a person with a drone missile
,
netzpolitik.org
,
(de)
, 2016-09-20
Phone-Cracking Cellebrite Software Used to Prosecute Tortured Dissident
,
theintercept.com
,
(en)
, 2016-12-08
Smartphone control in the USA - Don't lie!
,
deutschlandfunknova.de
,
(de)
, 2017-02-20
The end of anonymity
,
sueddeutsche.de
,
(de)
, 2017-07-11
Interactive card: mandatory registration for prepaid SIM cards widespread in Europe
,
netzpolitik.org
,
(de)
, 2017-08-02
Mobile phone provider: Objection to the collection of movement data
,
kuketz-blog.de
,
(de)
, 2018-02-09
The state pings every one and a half minutes
,
sueddeutsche.de
,
(de)
, 2018-08-07
35C3 - The hidden side of mobile communications
,
media.ccc.de
,
(de)
, 2018-12-29
How to protect your data at the border
,
zeit.de
,
(de)
, 2019-06-04
The 5-G monitoring standards
,
media.ccc.de
,
(de)
, 2019-08-28
How To CryptoParty
,
digitalcourage.de
,
(de)
, 2019-12-21
A killswitch for your smartphone
,
steampixel.de
,
(de)
, 2020-01-26
The voice: The new fingerprint
,
srf.ch
,
(de)
, 2020-02-20
GDPR complaint: Data protection officer considers Android tracking highly problematic
,
heise.de
,
(de)
, 2020-05-18
Bluetooth vulnerability enables undetected attacks
,
heise.de
,
(de)
, 2020-05-21
Why a hidden SSID does not provide security, but even enables movement profiles
,
wlan-blog.com
,
(de)
, 2020-06-28
Ever thought about hardware sealing?
,
steampixel.de
,
(de)
, 2020-08-09
Inverse search: Google provides police with user data based on search terms
,
heise.de
,
(de)
, 2020-10-09
Police receive a list of all users who have googled a keyword
,
netzpolitik.org
,
(de)
, 2020-10-13
GrapheneOS: The Android for security and privacy freaks
,
kuketz-blog.de
,
(de)
, 2020-11-17
Linux: How to encrypt a USB disk
,
medium.com
,
(en)
, 2021-09-01
DMCA Takedown - Delete your data from archive.org
,
steampixel.de
,
(de)
, 2021-09-21
For beginners/comfortable users: Ban ads and trackers under iOS/Android system-wide
,
kuketz-blog.de
,
(de)
, 2021-10-26
Advertising ID: How the license plate for smartphones works
,
mobilsicher.de
,
(de)
, 2022-01-24
Enable/disable developer options
,
heise.de
,
(de)
, 2022-02-14
Windows: How to password protect ZIP files and folders on PC
,
nordvpn.com
,
(en)
, 2022-03-30
Data protection only available with alternative Android
,
golem.de
,
(de)
, 2022-04-25
Authorities ask who owns a phone number every second
,
netzpolitik.org
,
(de)
, 2022-06-21
Tip: How to lock Face ID and Touch ID within 2 seconds
,
macerkopf.de
,
(de)
, 2022-06-29
Spam: e-mail junk on the Internet
,
verbraucherzentrale.de
,
(de)
, 2022-12-19
Windows: How to encrypt a USB flash drive—and why you should
,
microsoft.com
,
(en)
, 2022-12-29
Google pays billions for Chrome on iOS
,
onlinehaendler-news.de
,
(de)
, 2023-02-21
Police are prosecuting abortion seekers using their digital data — and Facebook and Google help them do it
,
businessinsider.com
,
(en)
, 2023-03-05
Police may take fingerprints to unlock cell phones
,
netzpolitik.org
,
(de)
, 2023-03-10
Stealth: FBI warns against using public cell phone charging stations
,
tarnkappe.info
,
(de)
, 2023-04-12
Stealth: Criminals sell malware injected into the Google Play Store
,
tarnkappe.info
,
(de)
, 2023-04-12
Do you really need a VPN?
,
kuketz-blog
,
(de)
, 2023-04-19
How to suppress a phone number
,
chip.de
,
(de)
, 2023-05-03
Company creates scoring profiles of half of all cell phone users worldwide
,
netzpolitik.org
,
(de)
, 2023-06-27
Deportation of tolerated persons: Berlin continues to search cell phones
,
netzpolitik.org
,
(de)
, 2023-06-28
How to use Android's lockdown mode (and why)
,
zdnet.com
,
(en)
, 2023-06-29
The adtech industry tracks most of what you do on the Internet. This file shows just how much.
,
netzpolitik.org
,
(de)
, 2023-07-06
BAMF to read out asylum seekers' cloud storage
,
netzpolitik.org
,
(de)
, 2023-08-04
Bluetooth spam now also works via Android app
,
golem.de
,
(de)
, 2023-09-01
Russian journalist in exile hacked with Pegasus
,
netzpolitik.org
,
(de)
, 2023-09-14
Stealth: Mobile phone providers once again illegally passed on data to Schufa
,
tarnkappe.info
,
(de)
, 2023-09-16
Internet without passwords: What you need to know about passkeys now
,
t3n.de
,
(de)
, 2023-10-19
Researchers: Security gaps in roaming remain a major threat even with 5G
,
heise.de
,
(de)
, 2023-10-27
Confiscated smartphones: an encroachment on fundamental rights of unknown proportions
,
netzpolitik.org
,
(de)
, 2023-10-30
Private as hell: iPhones revealed physical MAC address
,
heise.de
,
(de)
, 2023-10-30
Online advertising as a "serious security risk"
,
netzpolitik.org
,
(de)
, 2023-11-19
BLUFFS: New attacks jeopardize Bluetooth data security on billions of devices
,
heise.de
,
(de)
, 2023-11-30
11 Decentralized, P2P and Open Source Alternatives to Mainstream Social Media Platforms Like Twitter, Facebook, YouTube and Reddit
,
itsfoss.com
,
(en)
, 2023-12-04
Authorities ask Apple and Google about users of messenger apps
,
netzpolitik.org
,
(de)
, 2023-12-06
Remedy against government surveillance through push messages
,
kuketz-blog.de
,
(de)
, 2023-12-07
Authorities spy on users via push notifications
,
golem.de
,
(de)
, 2023-12-07
Apple beats the drum for end-to-end encryption of cloud data
,
heise.de
,
(de)
, 2023-12-07
Attackers can disconnect 714 smartphone models from the 5G network
,
golem.de
,
(de)
, 2023-12-09
Black Hat Europe 2023: New "AutoSpill" attack on Android password manager
,
heise.de
,
(de)
, 2023-12-10
Bluetooth gap: Keystrokes can be injected into Android, Linux, iOS and macOS
,
heise.de
,
(de)
, 2023-12-11
Apple guidelines: Court order for push data mandatory!
,
tarnkappe.info
,
(de)
, 2023-12-13
Transparent refugees - Changing lives for the worse with computers
,
media.ccc.de
,
(de)
, 2023-12-29
Emergency call 112: Android can send more data to control center in an emergency
,
heise.de
,
(de)
, 2023-12-31
Uproar over alleged backdoor in Apple chips for iPhones and Macs
,
derstandard.de
,
(de)
, 2024-01-07
Federal Network Agency shuts down pseudonymous mobile connections
,
netzpolitik.org
,
(de)
, 2024-01-08
Basic assumption disproved: AI finds patterns in a person's fingerprints
,
heise.de
,
(de)
, 2024-01-11
Security risk: This is how easy it is to secretly track cell phone users
,
heise.de
,
(de)
, 2024-01-12
State Trojans threaten fundamental rights in the EU
,
netzpolitik.org
,
(de)
, 2024-01-18
Whatsapp lets other users access device information
,
golem.de
,
(de)
, 2024-01-18
Pegasus infections in Togo revealed for the first time
,
netzpolitik.org
,
(de)
, 2024-01-23
Fake tweet to release Bitcoin ETFs: SEC victim of SIM swapping
,
heise.de
,
(de)
, 2024-01-23
Prominent iOS apps secretly spy on device data
,
golem.de
,
(de)
, 2024-01-24
Bluetooth too insecure: US Navy seeks alternative
,
heise.de
,
(de)
, 2024-01-26
Personalized surveillance instead of advertising: Mobile phone data analyzed and sold
,
heise.de
,
(de)
, 2024-01-26
Saxony-Anhalt - Police search a smartphone every 3.5 hours
,
netzpolitik.org
,
(de)
, 2024-02-12
Smartphone traps: Protection from subscription traps with third-party provider blocking
,
mimikama.org
,
(de)
, 2024-02-19
Researchers generate fingerprints from wiping noises
,
golem.de
,
(de)
, 2024-02-21
Signal will soon allow you to hide your phone number
,
netzpolitik.org
,
(de)
, 2024-02-21
Mailbox.org: Unlawful official requests for information have risen sharply
,
heise.de
,
(de)
, 2024-02-27
The spy from the advertising banner
,
golem.de
,
(de)
, 2024-03-18
Data protection authorities allow nationwide emergency call tracking
,
heise.de
,
(de)
, 2024-03-20
USA: Police want data on everyone who has watched certain YouTube videos
,
heise.de
,
(de)
, 2024-03-25
Telegram’s peer-to-peer SMS login service is a privacy nightmare
,
techcrunch.com
,
(en)
, 2024-03-26
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
,
thehackernews.com
,
(en)
, 2024-04-01
Surveillance now completely secret
,
nd-aktuell.de
,
(de)
, 2024-04-02
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
,
thehackernews.com
,
(en)
, 2024-04-03
Silent SMS & Co.: Government declares secret surveillance completely secret
,
heise.de
,
(de)
, 2024-04-03
US court approves forced fingerprint to unlock smartphone
,
heise.de
,
(de)
, 2024-04-19
Verified start
,
android.com
,
(de)
, 2024-04-29
Get rid of Google apps and other bloatware with the "Universal Android Debloater Next Generation"
,
gnulinux.ch
,
(de)
, 2024-04-30
Hundreds of thousands of euros to crack refugees' cell phones
,
netzpolitik.org
,
(de)
, 2024-05-24
When secret services obtain sensitive data from smartphone apps
,
netzpolitik.org
,
(de)
, 2024-05-29
Android malware: 90 apps with 5.5 million installations discovered
,
heise.de
,
(de)
, 2024-05-30
Journalists critical of Putin in the EU attacked with Pegasus spyware
,
heise.de
,
(de)
, 2024-05-30
Two-factor authentication please, but not via SMS
,
heise.de
,
(de)
, 2024-07-11
Quishing scam: e-car charging stations conceal fake QR codes
,
tarnkappe.info
,
(de)
, 2024-08-02
Cell phone ban: Dutch ministers would have to hand in devices in the future
,
heise.de
,
(de)
, 2024-08-23
Stealth: QR code phishing: danger from fake bank letters
,
tarnkappe.info
,
(de)
, 2024-08-24
New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards
,
thehackernews.com
,
(en)
, 2024-08-26
ATM rip-off: How fraudsters want to take money out of Android users' pockets
,
t3n.de
,
(de)
, 2024-08-27
How secure passwords work
,
netzpolitik.org
,
(de)
, 2024-08-28
Regensburg Regional Court: Radio cell searches also permitted for minor offenses
,
tarnkappe.info
,
(de)
, 2024-09-24
Stealth: Smart TVs from LG & Samsung transmit screenshots to their own servers
,
tarnkappe.info
,
(de)
, 2024-09-25
WhatsApp? No, thank you.
,
netzpolitik.org
,
(de)
, 2024-10-01
Smartphone access allowed even for minor offenses
,
tagesschau.de
,
(de)
, 2024-10-04
Telegram: Not suitable for confidential chats
,
nd-aktuell.de
,
(de)
, 2024-10-07
Telegram delivers data to investigators
,
tagesschau.de
,
(de)
, 2024-10-08
Why your smart TV is secretly taking screenshots and how to protect yourself against it
,
t3n.de
,
(de)
, 2024-10-15
The disturbingly easy mass surveillance with location data
,
netzpolitik.org
,
(de)
, 2024-10-24
7 essential password rules to follow in 2024, according to security experts
,
zdnet.com
,
(en)
, 2024-10-25
Stealth: Smartphone security in 2024: experts advise a weekly reboot
,
tarnkappe.info
,
(de)
, 2024-10-28
Investigators to gain easier access to cloud data
,
heise.de
,
(de)
, 2024-10-29
Stalkerware: protection against surveillance is possible
,
mobilsicher.de
,
(de)
, 2024-11-24
Pilot project: Police use AML for more precise location of emergency calls
,
heise.de
,
(de)
, 2024-11-28
Alternative search engines
,
digitalcourage.de
,
(de)
, 2024-11-28
Missing Link: Border security USA made in Germany
,
heise.de
,
(de)
, 2024-12-01
How the Serbian government spies on civil society
,
netzpolitik.org
,
(de)
, 2024-12-16
Volkswagen movement profiles of 800,000 electric cars revealed
,
golem.de
,
(de)
, 2024-12-27
Why a secret password for the family will be important in future - and what you should look out for
,
t3n.de
,
(de)
, 2024-12-30
"Single sign-on": risk with apps and websites
,
verbraucherzentrale.de
,
(de)
, 2024-12-30
Courts may use FBI cryptochats
,
spiegel.de
,
(de)
, 2025-01-09
Seven ways to protect your location from data brokers
,
netzpolitik.org
,
(de)
, 2025-01-15
How to stop spy apps
,
netzpolitik.org
,
(de)
, 2025-01-27
SparkCat: Trojan hijacks crypto wallets
,
tarnkappe.info
,
(de)
, 2025-02-05