They’re tethered to wireless networks, and we are tethered to them. We spend so much time with smartphones, yet most of us devote little of it contemplating our small computers. We often treat these valuable devices more like everyday household items, as opposed to curated archives of our lives.
If there’s one item in your possession housing the most information about you, it’s probably your phone. Keeping your information safe depends on learning a little more about how to choose your small computer, and how to care for it long term.
When shopping for a mobile device, we’re often thinking about how long the phone will last. We want a strong battery, fast hardware, and lots of storage to house our apps, photos, and other data. But there’s another thing we should consider when choosing a phone: How long will the phone receive security updates?
Security updates are our primary defense against malicious code taking advantage of vulnerabilities in our devices, yet phone manufacturers tend to have inconsistent track records supporting security updates. Mobile equipment manufacturers like Apple, Google, and Samsung all have different commitments to keeping your device updated with security updates.
For example, Apple has offered exemplary support, sending critical updates to iPhones manufactured as far back as five years ago. Google has required many makers of Android devices (e.g., “Android One” phones) to provide updates for at least two years, while several “Android Enterprise Recommended” phones (e.g., phones in the Google Pixel line) have committed no less than three years of updates.
Note this does not mean you’re getting three years of updates from your purchase date; you’re getting three years of updates since the release of the device. For example, there’s no guarantee of updates past October 2020 for the Pixel 2, and Google has not guaranteed updates past October 2021 for the Pixel 3.
The short version: iPhones are more likely to be a safe and reliable bet, yet they’re obviously much more expensive than many Android devices. If you’re going to get an Android device and you plan on using it for more than a couple of years, consider quickly searching for the model of phone you’re most excited about, and see how long it will receive updates for. Chances are, flagship devices such as the most recent device in the Google Pixel or Samsung Galaxy series will offer the most reliable updates. Likewise, for budget devices, consider newly-released Android One devices (e.g., Motorola One or Nokia), which have promised no less than two years of updates from the release date.
If your device leaves your possession, the data can be read or copied. Fortunately it’s easy to protect the data on your disk, so that it’s only readable after you enter your password.
If you have a password-protected iPhone, your disk is already encrypted. Simply locking your phone will encrypt the device.
For Android users, it’s easy to encrypt your mobile device. Some Android devices, such as those in the Pixel line, are encrypted by default.
Note that disk encryption is activated after powering off the phone. This means that solely putting the phone into sleep mode won’t activate disk encryption.
This isn’t great. But let’s dig into it: what exactly is the problem with a password like “000000”?
We know people often use short, predictable passwords. For example, in 2018 our greatest hits included “123456”, “111111”, and “password”. What most of these passwords have in common is that they’re easy to remember, and even easier to enter in your phone. The problem is that hackers and phone thieves know this as well.
Of course it’s possible for anyone to stand over your shoulder to see what you typed in. But even if they’d never seen you type it in before, anyone with access to software tools for cracking mobile passwords (e.g., GrayKey) can unlock the phone with enough time. Cracking tools offer automated techniques for attempting a list of likely passwords. If the likely passwords don’t work, many of these tools will try out every password possible, until it exhausts its likely options. However, this will always take time — ranging from seconds to years. By using a more unpredictable password, you can force them to wait a long, long time.
While considering a password that would still work for you in day-to-day use, get creative about using a password that people and computers would both be unlikely to guess.
There are a few common strategies for making your password less predictable, but still meaningful to you in the real world.
Use an alphanumeric passcode. On mobile devices, we often see numeric (0-9) passcodes, as well as grids. For each of these types of passcodes, we’re left with a relatively small number of possibilities, and using a passcode with both letters and numbers introduces millions of new possible passcodes, making your phone much harder for someone to unlock.
Likewise, consider a passphrase. This could be random, or near-random words strung together (e.g., “wrench quicksand”). Using unpredictable and, ideally, random words makes unlocking a device much harder. For a concrete way to generate truly random passphrases, check out the Electronic Frontier Foundation’s friendly passphrase generation guide.
The main trade-off with using a more complex password is that it will require slightly more time to type in.
Upgrading your passcode is easy.
Android users: Open Settings app > Security & location (alternatively, just "Security") > Screen Lock > Password
iPhone users: Settings app > Passcode (alternatively, “Face ID & Passcode” or “Touch ID and Passcode”) > Change Passcode
The fact is, no one wants to type in their passcode every time, and many phones offer alternative inputs that may or may not be appropriate for your situation, such as the capability to unlock your phone through a fingerprint or scan of your face through your smartphone camera. These can make it easier to log in and yet, at least in the United States, biometric information such as a fingerprint may have fewer legal protections than a passcode when unlocking your device.
Unlocking a device with biometrics is a decision that will depend on your security needs, and the likelihood that it introduces risk for you. Because some situations are more risky than others (e.g., attending a protest, versus using your device at home) think about whether unlocking your phone with biometrics is right for you.
Every day we hear about new vulnerabilities affecting our apps and devices. But behind the scenes, both lone hackers, hacking groups, companies, and government hackers are constantly finding and dissecting vulnerabilities in the software we use every day, analyzing their weak points and crafting exploits to manipulate or steal our personal data. In turn, security teams at companies responsible for your operating system, like Google, Microsoft, and Apple, are scrambling every single day to put out these fires. The main way they can help you inoculate your device from vulnerabilities and exploits is through security patches.
Google posts Android Security Bulletins to allow observers to see what goes into each security update. If you want to see what kinds of trash fires Apple is putting out with their most recent updates, you can check it out here. For example, Apple recently patched a FaceTime security bug that allowed users to turn on other FaceTime users’ cameras and microphones. If this sounds like a great time to update your device, keep in mind that similarly unpleasant bugs appear all the time.
Your phone is probably nudging you about new software updates for your apps, and for the device itself. The truth is sometimes we treat these updates as something that gets in the way. But exactly the opposite is true; security updates should give us reassurance that our devices are safer, allowing us to focus on the things we care about.
When those update notifications appear, don’t hold off. Take updates seriously. Simply updating your phone’s apps and operating system is the most important step we can take for the safety of our devices and our personal data.
Whenever you install an app, it may ask for permission to access information stored on your phone, such as your contact list, or information your phone can collect through sensors, such as your location. Maybe an app is asking for information that makes sense to you (e.g., Instagram asking for your camera). But they can also ask for things they are not entitled to. For example, maybe you just wanted to use your camera’s light as a flashlight. So why is a Flashlight app asking for permission to…?
Access camera for photos and videos
Record audio via microphone
Precise location data
View network connections
Read/write contents of USB storage
Most people probably have an app on their device that’s asking for information it doesn’t need. Consider reviewing the permissions for apps running on your devices, and turning off permissions that make you uncomfortable, or those that don’t seem quite right.
Android users (it might be slightly different, depending on your version): Open Settings app > Apps & notifications > Advanced > App permissions
iPhone users: Open Settings app > Privacy
Denying a permission could cause an app to function differently, or disable some features within that app. For example, if you have the Facebook app installed, you might find that the microphone permission is enabled to allow voice memos. You need to decide whether you’re okay with that. If you never plan on using a feature, there’s no harm in turning off the app’s permissions.
In the future we should also review app permissions, and choose whether to decline to install apps that ask for excessive permissions.
While we download updates to make it harder for Internet strangers to attack our devices, it’s also smart to minimize the how many places that can be attacked in the first place. Security people sometimes call this the attack surface — the range of possible footholds for vulnerabilities, based on issues with the code in the software on our devices.
Because each piece of software increases potential points of vulnerability, we also need to think about what software we don’t need.
If you haven’t used an app for a long time, and don’t plan on using it again right away, it may be worthwhile to remove it from your device. Simply removing old, unwanted apps can help make your device much safer.
It happens to the best of us: eventually our devices will be lost, stolen, or broken, and we don’t want to lose access to our data. Every now and again, it’s wise to make a backup copy of mobile files to avoid this cruel fate.
There are free and easy cloud services to help make backups, such as Apple’s iCloud and Google Drive. Each of these options will allow you to use the companies’ storage to keep and recover your files. The catch is that, while easy to use, we’re also allowing our data to be seen by the company. This leaves the data you back up with a third party open to lawful interception like warrants and subpoenas, as well as unlawful access like account hacking.
You can defend against lawful and unlawful seizure of data in your mobile cloud backups by pruning sensitive information you aren’t willing to share with a service, and locking down your account with a unique and complex passphrase and two-factor authentication.
If the risks involved in backing up with a cloud service are too great, consider backing up your devices locally.
If you have access to an external computer you trust, using it to make local backups will bring you some peace of mind. It’s easy both for iPhone users to make backups using iTunes. Android users can connect your phone to your computer and move the files.
While we’re at it, it’s also a good idea to back up your computer. Services like Google Drive or Dropbox are convenient but, again, also allow the companies to read your data. For remote backups, consider services like SpiderOak or Tresorit, which keep your data in an end-to-end encrypted format, meaning the data can only be read on your devices.
Mobile devices are increasingly where we socialize and get our work done, so knowing how to choose and maintain these devices matters. You may have some more specific needs and questions on this topic, and we’re always here to help reporters and news organizations around the world. If that sounds like you, contact our trainers for assistance.Photo by Act Project Concordia. CC BY-NC 2.0.