Signal, WhatsApp
💡 Why it matters: The app is secure. You might not be. A compromised device, screenshot shared with the wrong person, or a weak link in a group chat bypasses all encryption. Remember: in a group chat with 50 people, it's only as secure as the least careful person.
Private Browsing
💡 Why it matters: Incognito mode hides history from your roommate, not from the government. State actors and ISPs can still see your internet activity. Assuming it provides anonymity creates dangerous false security when researching sensitive topics.
Google Drive, iCloud, Dropbox
💡 Why it matters: Cloud accounts are primary targets for hackers. Providers can access your data and usually comply when governments request it. Companies are often legally required to hand over data when authorities request it. Encrypt before uploading to see only gibberish.
Full-Disk Encryption
💡 Why it matters: Encryption is most powerful when your device is powered OFF. If someone has physical access and can force you to unlock it, encryption can't help. A powered-off encrypted device is significantly harder to break into. Simple PINs can be guessed from fingerprint smudges on screen.
Permanently Erasing Data
💡 Why it matters: Files "deleted" normally can often be recovered with simple software. If device is stolen, confiscated, or sold, sensitive data could be retrieved. Journalists and activists have had "deleted" files recovered and used against them. Note: SSDs store data differently than HDDs - full disk encryption from day one + factory reset is best approach.
Virtual Private Networks
💡 Why it matters: Bad VPN is worse than no VPN - it gives dangerous false security while collecting all your traffic to sell to advertisers or hand over to authorities. Free VPNs make money by selling your data - that's their business model. Logging into Facebook on VPN = Facebook knows it's you.
Protection Software
💡 Why it matters: Antivirus is in constant race against new viruses. If not constantly updated, it cannot protect against latest threats, giving false sense of safety. Out-of-date antivirus is almost useless. But remember: antivirus cannot stop phishing, social engineering, or you willingly installing malicious software.
Bit.ly, TinyURL, QR codes
💡 Why it matters: QR codes can be physically swapped (especially at protests/events) with malicious ones. URL shorteners track everyone who clicks, expose data to third parties who may share with governments, and can be hijacked to redirect to malicious sites. For activism work, this is a real risk.