who are you protecting against and what are you protecting. eg. 1) your phone comms - read about the hacks and backdoors in ios and android phones (especially those published by kaspersky) etc. then decide on how to mitigate it. tossing the phone altogether if the threat is the state or something. 2) posting publicly - identity construction, typing analysis blah blah
who are you protecting against and what are you protecting. eg. 1) your phone comms - read about the hacks and backdoors in ios and android phones (especially those published by kaspersky) etc. then decide on how to mitigate it. tossing the phone altogether if the threat is the state or something. 2) posting publicly - identity construction, typing analysis blah blah