The document discusses operational security (opsec) regarding smartphone usage, particularly under threat models involving denial and deception tactics. It emphasizes the security vulnerabilities of mobile phones, the importance of using burner phones, and operational techniques such as event-based hardening and secure app management. The author also critiques Android's capability for security and presents guidelines for secure communication practices.
Related topics: