Amended Phone security section with tor for iOS.

This commit is contained in:
Pepi Zawodsky 2012-12-26 01:12:15 +01:00
parent 38e6ccf34f
commit 0aad8c5a6f

View file

@ -256,14 +256,17 @@ Also have those tunnels configured on ALL the devices you intend to use, and hav
### Phones
It is not recommended to connect your smartphone to the congress wifi, if you still can't resist, here are a few things to consider:
- make sure that it's **not a 802.11b** device, as it would slow down the complete wifi network.
- disable all synchronization services, as they might be using plaintext
- disable all auto-discovery services (network music players, remote control apps, etc...)
- make sure there are no known exploits for your device
- make sure there are no known exploits for your device (not that unknown-to-you exploits wouldn't be a possible risk as well…)
- Turn off push notifications
- update your apps, especially your browser
- use a VPN tunnel if possible
- use a Firewall and only allow the (few) services you trust.
- [DroidWall][20] for Android (root required)
- If you don't have a VPN tunnel available, you can use [OnionBrowser][7] to surf via tor (which may be it's own kind of risk)
**If you are unsure** that there might still be some services running and transmitting plaintext data, **do not connect**.
@ -288,6 +291,7 @@ These people have contributed to improve this list for everyone. In no particula
[4]:http://r0cket.org/
[5]:https://www.noisebridge.net/wiki/Passport
[6]:https://en.wikipedia.org/wiki/Schuko
[7]:https://itunes.apple.com/at/app/onion-browser/id519296448?l=en&mt=8
[20]:https://play.google.com/store/apps/details?id=com.googlecode.droidwall.free