An increasingly paranoid guide to smartphone security


Is it no exaggeration at all to say that your smartphone is your life? Your messages, your bank account, maybe even your smart-home hub: all accessible through that handset. With all the data we entrust to our phones, and all the private information we send through them, smartphone security is of the utmost importance. But are you doing everything you can to keep your phone and its data safe?

With government interests demanding greater and greater access to smartphone data, and the fallout from surveillance-sector leaks continuing to reveal the extent to which our communications may have been secretly monitored, you'd be forgiven for getting a little paranoid about phone security.

That's exactly why we've cooked up this guide for you, helping to ease you into this new paranoid lifestyle. After all, good security requires trade-offs, and we've got to find a balance between factors like convenience and security when deciding just how far we want to take things.

Will you follow these measures through to the extreme, ending up living in a signal-blocking Faraday cage and mumbling to yourself about a Snapchat-driven conspiracy to rig the 2016 election? We can get you there, but baby steps first: let's take a look at some of the more reasonable security precautions you can take to help keep your phone safe and your data private.

Locking the front door


The very basics of phone security start with access, and if an attacker can't get into your phone, his or her options for stealing your data are immediately pretty limited.

Smartphones have been giving users the option to lock their devices with PINs, passwords, patterns, and (with a non-P-word combo-breaker) fingerprints for ages now, and there's little excuse for not taking advantage of at least one of these methods.

Especially with the rise in availability, performance, and accuracy of fingerprint scanners on phones lately, implementing a secure lockscreen is trivial and the most basic step you can take towards securing your phone.

Encryption


Once you've got that lock in place, your next step is putting it to good use. Beyond preventing nosy co-workers from snooping through your photos when you turn your back on your phone, modern lockscreens do double-duty by also serving as our access points to full-disk phone encryption. This is exactly the sort of security that's at the heart of the recent FBI San Bernardino iPhone 5c hack, designed to prevent even advanced threats that have physical access to your phone (and its on-board storage) from being able to read your data.

The great news here is how integrated such encryption already is. If you're an Apple user, there's nothing for you to worry about, as Apple's baked in encryption by default since iOS 8.

On Android, the situation is a little more hit-and-miss. Newer phones running Marshmallow are supposed to have encryption enabled by default, but older or less powerful handsets might not. In that case, you can always flip it on yourself by pulling up phone settings, going to the Security screen, and tapping the “Encrypt phone” option.

Already we're facing a trade-off: storage access speeds are going to be lower with encryption enabled. That performance penalty is less of a big deal on modern phones with processing power to spare (and dedicated hardware encryption engines), but things will never be quite as fast as with no encryption at all.

But this is not a guide for the timid. Sacrifice those clock cycles in the name of data security! And once you've got your phone nicely encrypted and locked down, we can turn to keeping your communications secure.

No one listening on the line


For all the steps you can take to keep the information that's physically on your phone nice and safe, they won't do you much good when you need to start communicating with other people – and sending messages out to their phones. You've got no shortage of messaging options out there, but which are going to keep your conversations safe from anyone who might be listening in?

Secure IM


Right now, the gold standard in secure communications is end-to-end encryption. That means that your phone encrypts its messages before they even leave the handset, and they stay encrypted the whole time they're moving across cellular networks and the internet's backbone, before finally being decrypted on the recipient's device. The important bit here is that the companies offering end-to-end services can't themselves decrypt any in-transit messages.

Once again, Apple's ahead of the game here, and iMessage already has some nice public key end-to-end encryption. The key exchange (the technical stuff that makes this kind of encryption possible) operates seamlessly behind the scenes, and even works well with users juggling multiple iOS devices.

There are plenty of third-party ways to do end-to-end instant message encryption, and easily the most popular is WhatsApp. Last month the service announced that its end-to-end efforts covered users across mobile platforms, and encrypted messages as well as data like photos, voice, and video.

If WhatsApp isn't your thing, you can always turn straight to the horse's mouth: WhatsApp uses technology from Open Whisper Systems to implement its encryption, and OWS has its own secure messaging app, Signal. The app's open-source, so you can always pore over the code and make sure there are no hidden backdoors, and implementations are available for both Android and iOS.

Email privacy


That's got us covered for IM, but what about some old-school email action? Email encryption is the grandfather of encrypted communication services, and if you thought the current debate over smartphone encryption was a novel occurrence, you owe it to yourself to read up on the early-'90s debut of Pretty Good Privacy, an encryption package the government investigated under the same laws that regulate arms trafficking.

PGP lives on in the form of OpenPGP, and you can find compatible smartphone apps like OpenKeychain or the related Android Privacy Guard. Though the way they expose users to keys, fingerprints, and a lot of technical jargon may seem a bit overwhelming at times, their ability to work with plain text (which you can send over email or the communication channel of your choice) makes them incredibly flexible tools for getting your secure message where it needs to go.

At this point, you're quite the little digital-privacy maven. You've got your phone secure, and your communications secure. Time to kick back and enjoy the fruits of your labors? Sure, you could, but you'd be missing out on some of the really fun tin-foil-hat stuff.

Batten down the hatches


End-to-end encryption may keep your messaging private, but what about the rest of your app data? Well-written software will implement its own encryption as it talks back home to its server, but you can take things to the next level with a VPN.

Virtually secure


A virtual private network essentially acts like an encrypted tunnel, protecting every last bit of data that leaves your phone before it even hits a cellular tower. If you're worried the phone company can see what you do on your phone, or you're concerned who's really behind that suspiciously convenient open Wi-Fi access point you've been using, this is a great way to protect all your data in one fell swoop.

Services like VyprVPN offer turnkey VPN solutions: just sign up, install the app, and you're practically good to go. Then all the data traffic both to and from your phone is encrypted all the way to VyprVPN's servers, before it's exposed to the internet at large. And as a VPN works on top of other encryption layers (like we're using for IM and email), we get extra security without breaking anything in the process.

Using an arrangement like that means trusting the VPN provider – you are giving them access to all your phone's data traffic, after all. If you want something done right (and done secure), sometimes that means doing it yourself, and if you're up for it you can always roll your own VPN solution. You can buy a little personal server in the cloud for as little as $5 a month, and if you can find your way around an SSH terminal well enough to install the free, open-source OpenVPN software, you've got an affordable VPN service that you personally control from ground up.

Always wear protection


We've spent all this time girding our loins in anticipation of wireless eavesdroppers, but what about wired threats? Oooh, we like the way you're thinking, seeing data-stealing risks everywhere.

With wireless charging taking its sweet time to find mainstream acceptance (but we're getting there), the vast majority of us charge our phone via cables, and USB cables to be specific. USB is a really convenient way to get access to power, but the interface is designed for a lot more than just that, and even if we're only interested in using a port for its electricity, we've still got those data lines to worry about.

Could that innocent-looking charging kiosk be loaded with USB-vectored malware just waiting for the chance to leap over to our phones? There's no way to know, which is exactly what makes this such ideal paranoia fuel.


Now, Android's already taken some steps to prevent against rogue USB cables messing with our phones when we just want a charge, as Marshmallow defaults new USB connections to charge-only mode. Such software protections are great, but nothing beats a good hardware fix, and we find ours in the form of a USB “condom.”

These adapters are designed to allow USB power to pass, while physically disconnecting the USB data lines. In “condom” form, they're small adapters that fit between your phone's charging cable and its USB power source. You can also find purpose-built cables that internally disconnect those data pins. Would it be too paranoid to use both at once? Friend, there's no such thing.

Go open-source or go home


We've been talking a lot about keeping data safe on your phone, but how private is that data really when you're sharing so much of it with third parties? Apple makes a point of wearing its commitment to user privacy as a badge of honor, but Google's got no shame in admitting that it's an advertising company, and your user data is a targeted-ad goldmine. While Android users can take many steps to limit just how much of their personal info they end up sharing with Google, maybe the more security-focused solution is to just cut ties with Google altogether.

Unregistering your Google account from your phone is a good first step, but we're not about half measures here: if we don't want Google nosing around our data, we want the company's software gone for good. There are a number of custom ROM options that go down this road, but if we're willing to make some big sacrifices in the name of security, few go further than Replicant.

Replicant seeks to remove not just Google software, but any and all non-open code from Android. That creates some big problems for compatibility, as drivers for key phone hardware are often provided as binary blobs that can't be adequately vetted for security - so Replicant does without them. Running Replicant means using some very old phone hardware (we're talking Galaxy S2, first-gen Galaxy Note, or Galaxy Nexus era) and losing key features like Wi-Fi and Bluetooth in the process (thank god cellular data still works). But if you want to make sure that your smartphone OS itself isn't spying on you, this is the path you should be prepared to take.

They're all out to get me


Do you hear that? Are those helicopters? They always fly low to the horizon, so you don't know they're coming until they're right on top of you. What? Smartphones? You stay away from my phone, you hear?

The perfect-ish algorithm


You're still relying on the public-key encryption schemes of OpenPGP, iMessage, or WhatsApp? You fool. Don't you know that they're based on nothing more secure than math? Why, the second quantum computing becomes viable (and who's to say it hasn't yet for a certain three-letter-agency whose initials rhyme with MFJ?), they're as good as useless.

Instead, we need a good old one-time pad. With a OTP, there's no fancy key negotiation, no complicated math, just one incredibly long, theoretically perfectly secure, random key. Sure, if you listen to security experts they'll tell you that OTPs are next to impossible to actually implement in a usable, secure manner – but isn't that just what they'd want you to think?

Android users who aren't ready to drink that Kool Aid can start securing their messages via OTP with apps like the Zendo secure messenger. Is it slightly impractical? OK, so you do have to meet with your message recipient first in real life to do an in-person key exchange, but that's just some cloak-and-dagger bad-ass spycraft right there. And once you've got those keys set up, you can start exchanging some of the most secure messages ever.

Your phone's encrypted storage similarly won't be much good once those quantum supercomputers start factoring prime numbers as easily as they add 2+2, so how are we to keep our data safe? Once again, it's physical security to the rescue.

Removed from the equation


If your most valuable data isn't on your phone at all, it suddenly becomes a lot harder to get at, so why not bring external storage into the mix? If your phone supports microSD, that's a good start, but it's not without its trade-offs. Those cards can be hard to get to on a lot of phones, preventing quick removal when you need to make that data disappear. And if you're using adoptable storage in Marshmallow, you can't be inserting and removing cards willy-nilly.

Instead, the best solution might be an external drive: options exist with both microUSB and Lightning connectors, or you can always use a traditional USB thumb drive with a USB-OTG cable.

Then you just need to keep your important documents, your private photos, and all your most valuable data stored on that flash drive.

Pop it on your phone when you need access, and when the men in black come looking for it, you can always swallow it to conceal the evidence.

On second thought, carrying a drive like that around sounds like an unacceptable risk. What you're going to want to do is dig a nice, deep hole in your backyard, seal that flash drive up tight, and bury it where no one will find it. While we're at it, it's probably safer for you to bury your phone, too. Remember, you didn't read any of this.


references: Open Whisper Systems, Replicant, Zendo (iTunes, Play Store), VyprVPN, OpenVPN, OpenKeychain, Android Privacy Guard

FEATURED VIDEO

7 Comments

1. hafini_27

Posts: 951; Member since: Oct 31, 2013

Too paranoid for me.

2. Abdbaas

Posts: 155; Member since: Apr 05, 2016

I would have put Telegram in IM. Probably the safest. WhatsApp being owned by Facebook doesn't sound right to me. Might be wrong.

3. tacarat

Posts: 854; Member since: Apr 22, 2013

Biometrics can be an issue because your consent may not be needed to access the device. Password the lock screen, fingerprint the apps?

4. Bernoulli

Posts: 4362; Member since: Sep 01, 2012

Why not get a BlackBerry smartphone? That's what I did after I started getting a lot of telemarketing calls from my previous HTC phone

5. middlehead

Posts: 467; Member since: May 12, 2014

If you're that worried about what's on your phone, DO NOT use a fingerprint lock. Legally, PIN or Swipe are much more secure.

6. zeeBomb

Posts: 2318; Member since: Aug 14, 2014

Why is it good to go open source like in apps and etc?

7. slatt01

Posts: 9; Member since: Aug 25, 2015

If your really that paranoid dont use smartphones

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.