Our mobile phones have become the center of our digital lives. We carry them with us everywhere we go. Let's learn how to keep them physically secure.| Firewalls Don't Stop Dragons
Your rights are significantly reduced when crossing the border, even if you're entering your own country. Sadly, there's not a lot you can do about it.| Firewalls Don't Stop Dragons
I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about securing computers, but very little about securing phones. Are there easy ways to delete data—files, photos, etc.—on phones so it can’t be recovered? Does resetting a phone to factory defaults erase data, or is it still recoverable? That is, does the reset erase the old encryption key, or just sever the password that access that key? When the phone is rebooted, are dele...| Schneier on Security
Use these tips to avoid social engineering schemes and learn what to do if you receive suspicious emails, phone calls, or other messages.| Apple Support
This resource hub was prepared by the Security Lab for human rights defenders, activists, journalists and other members of civil society.| Amnesty International Security Lab