Jump to content
  • Announcements

    • CyberGod

      Donate and Get VIP Premium Accounts Plus More!!!

      If you have ANY questions about donating, please PM ADMiN   ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••   CP NEEDS YOUR DONATIONS!!!   Cyberphoenix runs on high-end Intel Servers , Your donations help us keep the site running smoothly     Donating to CP not only provides you an opportunity to support the site but also get your name posted in the shoutbox, recognizing that you donated, and publicly thanking you.   Benefits of Donating ► Respect of all of our staff, mods, and members.   ► Access to our special VIP forums.   ►A Green name color.   ► A custom member title. (Instead of teacher you could be l337 Donator)   ►In depth tutorial on how to activate windows (including windows 7) / office & receive windows updates!   ► #1 Priority when you request in VIP Requests.   ► The latest HTTP (non rapidshare) links and Premium Downloads!!!   ► You get to have an email like yournamehere@cyberphoenix.info (PM for info!)   ► Max PM storage from 50 to 10,000.   ► Can DELETE your own posts.   ► Avoid all Flood Control Limits.   ► Can change your display name max of two times every 30 days. (PM for info!)   ► RapidLeech Services.   ► Can request, and get #1 priority, in the shoutbox.   ► There is so much that isn't listed here. Donate Today!   We also have a lifetime package available!
    • CyberGod

      Rules of the CyberPhoenix Community : A Must Read   03/16/2018

      All Boards: 1.1 Cyberphoenix is a family forum open for all ages. Explicit, vulgar language, drug, religion, political talk, nudity, porn, hacking, money schemes, scams,advertisements and such others are not allowed. There will be a straight ban, no bargains. 1.2 No mini-modding. Use the report button but do not add your own criticisms.The forum language is strictly limited to English. This includes posts, titles, signatures, profiles and other forms of public display and also includes the main audio language of movies etc. 1.3 No advertisement of any website or forum in posts or signatures nor any live links to be posted. 1.4 All e-mail addresses, passwords and external links of any kind MUST be coded. 1.5 No bumping of threads. 1.6 No impersonating a staff member. 1.7 Respect one and all and No Flaming 1.8 Any member with multiple accounts will have all accounts permanently banned immediately, no bargains. 1.9 No Disrespecting CyberPhoenix Staff will be tolerated and can lead to a Permanent Banned.     Warning System: 2.1 Members breaking rules will be appropriately warned or banned. 2.2 Members with three warnings will be immediately banned.For serious offences or anti-forum activities and posts, members may be banned without warning. 2.3 Warnings may have an expiry date or may be permanent if more serious. 2.4 Do not argue about warnings or bans because they could escalate; pm senior staff if necessary.   Posting Rules: 3.1 a) All topics must contain a valid description. b) Topics must be posted in the relevant forums. Check before you post. c) All freeware posts must have the software homepage link in the post.   3.2 Topic titles must be appropriate. No adjectives such as new, latest, etc. or other such words are to be used in the title. 3.3 Absolutely no duplicate posts. Search before you post and update your links, by editing your post, if necessary. Add to the existing post on that topic. Non-compliance will get post deleted and member warned. No bargains and no clarification on this. 3.4 ALL externally hosted files MUST have a 'freely available' option without the need for Premium Accounts or Registering, completing surveys or assorted hoop-jumping. This also means ensuring file sizes are within the limits specified by any Hosting Site you upload to. Larger files requiring Premium or Registering access may only be shared providing a 'free' option has been given. Disabling the Add Blocker is considered Hoop-Jumping and isn't allowed. 3.5 . No Trading or selling allowed and promoting of Premium Accounts to enable faster/unlimited downloading is not allowed. Each site has advertising within it's own pages clearly showing benefits of Paid versus Free accounts. Please do not act as a salesperson or chase commission through referrals. 3.6 Posts should not contain explicit, offensive, shocking, nudity, and meaningless matter. All freeware posts must have the software homepage link in the post. 3.7 No megapost or multiple threads for a topic allowed. (Only Staff and VIPs with permission from admins can).No index page, every post is to be separate. 3.8 Do not excessively and unnecessarily 'pad out' your archives/files (rar,zip,etc..). For example, adding a 10MB .mp3 with a 50k .sis OR 3mb image file with a 3mb .apk just to earn an extra file host point is totally unacceptable. Maximum acceptable file size that can be added in rar/archive is 3mb. Staff reserve the right to edit any file & re-upload or simply remove/trash without notification. 3.9If the RaR file has a Password you must give the Password and/or the Post will be Deleted and further action can happen   Banned Filehost: 4.1 Filevelocity, Katfile, linkcrypt, ryushare and 4shared are not allowed on CP. Any post/thread not adhering to this policy will be deleted. Further file hosts may be added in future. Catshare, Hulkload, Nitroflare, picofile.com and egofiles, Uploadrocket and Uploadgig,com now added to banned list as well as Kingfiles.Fileshark.pl, Linkshrink.net, Multiup and worldbytez.com and Up-4ever 4.2 No Redirector, masked, protected or referral links otherwise your post may be edited or simply removed/trashed without notification. These sites include, but not limited to the following, subject to addition with immediate effect: up07.me 4shared.com 4shared.eu adf.ly adfoc.us anonym.to any.gs bit.ly bitly.com Catshare.net Downloadsafe.org dyo.gs egofiles file.cloudns.org filehost.s7s7.org filefox.cc filemates.com Fileshark.pl Filevelocity hootsuite.com katfile.com Kingfiles.net letitbit.net linkcrypt linkcrypt.ws linkcrypter.com linksbucks.com Linkshrink.net makeashorterlink.com masl.to Multiup.io Nitroflare paste2.org Peeplink.in picofile.com q.gs qqc.com ryushare.net ryushare.com s2l.biz Secureupload.eu sharecash.com sharecash.org Sharesix.com Short.go4down snipurl.com ow.ly tinylinks.co tinypaste.com tinyurl.com Up-4ever uploadbox.com Uploadgig uptobox.com Uploadrocket usercash.com verified-download.com worldbytez.com   Spam Rules: 5.1 No promoting any website. For the Link Heaven section sites that are within the rules are allowed. 5.2 No webhosting discussion, introduction or advertisement unless it is a CyberPhoenix sponsor. Passwords with other site names are not allowed. 5.3 Unrequired passwords but posted or Posts requiring passwords with missing passwords will turn the post spam. Spam will be deleted and the member banned 5.4 Wrong content in files with dubious names or containing security threats will lead to bans.   Private Messaging: 6.1 All above rules apply to private messaging. Poaching any member or staff member is strictly forbidden. 6.2 PMs from staff and admins must be replied within 48 hours or the member will be restricted from using the forums.   Avatars and Signatures: 7.1 All above rules apply to avatars and signatures. 7.1 The total maximum dimensions for all images in a signature is 500px (width) by 200px (height) horizontally only.   Explicit Guidelines: 8.1 Sticky Requests: No request for a post to be made sticky. No polls for topics usefulness or stickiness. 8.2 Normally no username or password changed except staff or VIP. 8.3 Don’t ask for promotions, send applications in the designated forum only. No advertising sites or email addresses in images or text.   ShoutBox Rules: 9.1 No Spamming, flaming or vulgar words or discussions about banned subjects. 9.2 Strictly No Requests in Shoutbox or your Privilege will be Revoked. There is a separate forum for requests. 9.3 No answering requests or posting large images in shoutbox. 9.4 ShoutBox is for General Chat - Political Statements will be kept to a minimum (If CP Staff thinks it too much he/she will stop it).   Regards CyberGod       These rules may be subject to amendments at any time so please keep referring back from time to time.   Legend: Basic rules fundamental. Usually about all sections. Usually about Download Links sections. Usually about requests and general sections. Advanced rules specification.
    • Mr Grumpy

      VPN Unlimited Lifetime subscription competition   04/28/2018

      Don't forget the competition is still running until May 26th. All you have to do is visit  http://www.cyberphoenix.org/forum/topic/605629-vpn-unlimited-lifetime-subscription-competition/?tab=comments#comment-733772   and make a post. Those members taking part will be put into a random draw and the winner will receive a VPN Unlimited Lifetime subscription as used by several of the staff
Sign in to follow this  
Tech 425

How to protect your privacy using Android

Recommended Posts

How to protect your privacy using Android






We keep an awful lot of personal information on our mobiles these days and, as a direct result, these devices know quite a lot about us. From our location and contacts to our favourite hangouts and hobbies, we happily exchange some of this information for “free” services from the likes of Google and others, but there are plenty of less scrupulous people and businesses out there that would also like to get their hands on this valuable asset.


These days, it makes a lot of sense to look after the data stored on your smartphone and fortunately there are plenty of handy tools available within the Android ecosystem to help keep your data private.



Use the lockscreen


Using a basic PIN, password or swipe gesture really is the bare minimum level of security that everyone should put on their smartphone. As shocking as it might sound, data from a reputable survey in early 2016 suggested that 34 percent of all Android users don’t even make use of the basic lockscreen feature that is built into every Android smartphone. Granted, this may have increased since then, but it still illustrates an important point — not everyone takes security as seriously as they should.






While the talk about malicious software, bugs, and backdoors may often make tech headlines, physical phone theft is still a real issue. If a criminal lacks a conscience enough to steal your phone, they probably won’t have too many qualms about sifting through your contacts, pictures, and emails in an attempt to grab personal data that would be used for further exploitation. There’s a good chance that you’re making use of a banking app on your phone too, and you really wouldn’t want someone to get into those types of important and personal apps.


Enabling a lockscreen PIN is incredibly simple, just head on over to Settings -> Security -> Screen Lock. Here you can pick from your preferred password lock type, which you will then need to enter each time you try to access your phone. Other manufacturers may move this menu to under general settings, if they have their own lockscreen protection alternatives, such as LG’s knock code. And of course, a lot of phones these days give you the ability to log in with other methods like your fingerprint, if passwords aren’t your think.



Device Encryption


Applying a password to your phone’s lockscreen is a start, but particularly nefarious and skilled criminals may still be able to access your files, given enough time and access to say a stolen smartphone. Device encryption can be used put all of your files into a format that cannot be understood without first decrypting them with the proper key, or a password that only you will know.


Encryption is a really tough form of security, hence why the FBI doing battle with Silicon Valley companies in an attempt to bypass it. However, it comes with a bit of a performance penalty on some older smartphones, although newer devices shouldn’t notice any issues.




Much like the lockscreen, encryption options can be found under the Settings -> Security menu, where you will find options to protect both the data on your smartphone and microSD card, if your device has a slot. Encryption can take a little while, so best to start up the process with a full battery and plenty of time to spare.



Find my Device


While we are dealing with taking precautions against stolen smartphones, all Android users should take a little bit of time to check out Google’s Find My Phone feature. Previously known as Android Device manager, this service is linked up with your Google account and can be used to manage all of your Android devices remotely, providing that they are connected to the web.


Find My Device can be logged into through any web browser. From here you will be presented with a list of your devices, with options to track their location, make them ring in case your phone has stuffed itself down your couch, or to “enable lock and erase”. By enabling this last feature you will be able to remotely lock your smartphone or tablet, and even completely erase all of the data on the device if it’s stolen.


Google's Find My Device






You can also find these same settings directly on your device. Head on into “Google Settings” and tap Security. Under Find My Device you can review and edit options for remote locking and erasing.



Picking Tougher Passwords


Along with just plain out not using a lockscreen, weak or commonly used passwords are the biggest no-no if you’re looking to keep your data secure, both on device and online. Lists of the most commonly used passwords are published rather frequently and if your password of choice appears on that list, you should really change it. 


Disappointingly, the most common passwords rarely change, so here are some to definitely steer clear of:

  • 1234567 (and other basic counting variations)

  • password

  • qwerty

  • football

  • welcome


As a general rule, a mix of cases, numbers, and special characters (where allowed) makes for the most secure password, and the longer the better too. 8 characters is really the bare minimum recommended, but moving up to 12 or 16 makes them so much harder to guess.


A strong password is a good start, but using multiple passwords is even better. You’ve no-doubt heard about sites being hacked and passwords exposed, so it’s not very safe these days to rely on the same code for all of your accounts, apps, and websites. Of course, keeping track of all these different passwords can be a nightmare, but there are a number of apps out there that can help manage them all and can even generate very strong random passwords.


Android apps like LastPass, mSecure, oneSafe, and Keepass2Android each offer up their own selection of unique features for additional security. These include secure password storage options, two factor authentication, and multi-device support, among others.


LastPass Password Manager



mSecure - Password Manager



oneSafe - Password Manager



Keepass2Android Password Safe




VPN (Virtual Private Networks)


So far, we have mostly dealt with offline security and preventing thieves from cracking into your private files. However, it’s also possible for the bad guys out there to track exactly what you’re looking at and downloading online.


One way around this is to use a Virtual Private Network (VPN). Instead of communicating directly with every website that you visit, a VPN service will route your traffic through a different server or selection of servers first. This way, your IP address and device are not immediately connected to an end service, although it doesn’t stop somebody from tracking the chain further back if they are really that interested in what you were up to. Some VPNs will also keep a log of what you’re up to, so always best to check out the terms and conditions before you use any service.




VPN’s add an extra layer of privacy, but they don’t make you completely invisible. They are also commonly used to access websites that are locked to a specific region, such as on demand video streaming services. However, you will often find that your internet speeds slow down quite a bit because of all the diverted traffic.


There are a number of free options out there, but most of these come with a catch. You know the saying, if the service is free then assume that you’re the product. Instead, picking a paid for option will likely result in faster browsing speeds and better privacy.

We recommend VPN Unlimited, it’s secure, fast and reliable with apps for all your systems including Android/Windows/Mac/iPhone.


VPN Unlimited: Lifetime Subscription



Another very high quality VPN service is ExpressVPN, which we’ve lately found works particularly well on Android. Although a little pricier, ExpressVPN keeps no logs and has minimal browser slowdown.






Encrypted Communications


While VPNs can offer some degree of privacy, the only sure fire way to know that no unwanted eyes are snooping in on your communications is to use encryption. Several Android apps have incorporated encryption into their messaging services to varying degrees, with uses ranging from simple text messages to video calls.


Much like device encryption, these apps can scramble up communications into a form that is virtually impossible to decipher without the correct key. This allows for messages and files to be sent between parties over the web and only unscrambled at each end with the correct matching key. This method is very effective at keeping information secure, so much so in fact that law enforcement agencies around the world are rather hostile to it.


A number of commonly used mobile messaging services use some form of encryption, including BlackBerry Messenger, Facebook Messenger, Skype, Snapchat, and WhatsApp.


I personaly use Signal Private Messenger for calls, SMS and MMS.






However, many of these apps aren’t using end-to-end encryption, whereby the keys are only known to the devices at each end. Instead, a lot of the most popular services use server based encryption. So while outside lookers won’t be able to unscramble any intercepted communications, the service provider likely knows the key to decrypt your messages and will therefore be able to understand and share your communications with third parties, such as law enforcement agencies, if so requested.


You can take a closer look at exactly how secure a number of these encrypted data apps actually are over at the Electronic Frontier Foundation’s handy Secure Messaging Scorecard.


Electronic Frontier Foundation’s handy Secure Messaging Scorecard


Note: EFF is updating the Secure Messaging Scorecard at the momment.



Understanding App Permissions


Now that we’ve dealt with general data privacy, the other major snoopers in the mobile space are actually the apps that we all download. Of course, you should always install software only from trusted sources, such as the Play Store, but even then some apps, especially the free ones, exist to turn your data into profits. Ad supported apps are one thing, but digging through your files is another.


One big hint that an app may be up to something dodgy is to check out the permissions that the app requires upon installation, and think about what makes sense for the features that the app is offering you. A classic example is the range of popular flash-light apps available, with many requesting access to USB storage, WiFi networks, data, and Google services, none of which really have anything to do with turning a flash-light on or off.




Unfortunately this is a rather grey area, with some permissions being required to perform certain tasks that might not immediately seem key to the app’s main purpose. Top notch app developers should explain why certain permissions are needed in the app’s description, but this is not as common an occurrence as it should be.




With the introduction of Android Marshmallow users can actively manage which features apps have permissions for. To do this, simply head on over to Settings -> Apps -> click the gear icon -> App Permissions. However, not all apps have been updated to comply with the latest Marshmallow API, so disabling some permissions may break older apps. Expect to spend some time on trial and error here.



Anti-Virus apps


While the Play Store does a very good job at screening out malicious applications, additional security can be had with the range of anti-virus apps available from the store. This isn’t really necessary for most users, but if you’re big on side-loading apps from other developer websites, then anti-virus is certainly worth looking into.


Of course, the free versions are probably going to be collecting some data to sell for advertising purposes, so those versions defeat the purpose of our article. But there are a number of reasonably priced options available that also introduce some additional features.


Many anti-virus apps pack in anti-theft features these days, including remote phone locking and wiping, much like the Find My Phone feature. Furthermore, some of these apps can keep an eye out for broader Android security vulnerability exploits, such as Stragefright, and offer protection from malicious emails and rouge websites, which isn’t so easily covered without an anti-virus app.



Wrap up


That’s quite a list, but there are plenty of little things that you can quite easily do to protect your privacy and help keep your Android devices a little more secure. On top of all the apps and settings listed here, perhaps the most effective change that you can make is to tweak your phone habits. Keep location usage to a minimum, disable or uninstall apps that you don’t use, keep an eye on app permissions during updates, and change your passwords regularly, and you should be safe enough.


If you have any of your own privacy tips and tricks, please feel free to share them in the comments below.

  • Like 1

Share this post

Link to post
Share on other sites

Wow,...very intuitive and thought provoking! :goodpost: Thanks Tech for the informative info!

  • Like 1

Share this post

Link to post
Share on other sites
Sign in to follow this