© Carey Parker 2018
Carey ParkerFirewalls Don't Stop Dragonshttps://doi.org/10.1007/978-1-4842-3852-3_11

11. Don’t Be a Smartphone Dummy

Carey Parker1 
(1)
North Carolina, USA
 

Mobile devices have become integral parts of our lives—particularly smartphones like Apple’s iPhone and all the variants of Android phones. Smartphones contain unbelievable amounts of extremely personal information including financial data, health data, your personal address book, e-mails, web surfing history, and access to much more data in the cloud. They also track your location pretty much anywhere on the planet, 24/7, because frankly they have to send you texts and phone calls. If that weren’t enough, smartphones have built-in microphones and cameras that can record everything you do. Your mobile phone may have more personal information on it than any other device you own, even more than your home computer. And make no mistake—a smartphone is a computer, and a very powerful one at that. Do you remember the Deep Blue supercomputer that beat chess champion Gary Kasparov in 1997? The iPhone 8 has more than 20 times the computing power as Deep Blue, and it fits in your pocket! So, let’s talk about how we can secure these wonderful devices.

iOS Is More Secure Than Android

Let’s get this out of the way: in my not-so-humble opinion, iOS is way safer than Android. Unlike Mac OS versus Windows, the difference between these mobile operating systems is significantly starker. Google is doing some fantastic work in the realm of security, don’t get me wrong. But the Android ecosystem is fundamentally different than that of iPhones, and those differences make Android phones a lot harder to secure.

When Apple came out with the iPhone, it was really in the driver’s seat. Steve Jobs knew that this device was going to completely change the smartphone world, and he managed to get all the major cell phone carriers to give him maximum control over the software on this device. The problem with Android is not that it’s not secure. The problem is that Google gave too much control over the software to the cell phone manufacturers and service providers. I’m sure there were business realities at play here. Perhaps the cell phone folks felt burned by Apple’s control over iOS and demanded more ability to control the Android OS on the devices they sold. So, you could argue that this isn’t really Google’s fault. But however it happened, the cell phone makers and cellular service providers are an integral part of the supply chain and serve as gatekeepers all software updates to Android phones. As recently as a couple years ago, a study found that almost 30 percent of Android phones weren’t even capable of getting the latest software. Even if the phone makers and service providers want to allow the updates, they have to go through a lengthy process of testing the changes on each device first.

Google is working on changes to Android that will address these problems, but because of the previous problem, it will work only on the very latest phone models. It could be years before most Android phones will be able to stay as up-to-date as Apple iPhones. A notable exception would be Google’s own Nexus and Pixel smartphones. In this case, Google is in full control of both the hardware and the software (much like Apple), allowing Google to keep these phones updated with the latest security software and fixes.

iOS Is More Private Than Android

While the security issues are important, to me the real difference between Apple’s iOS and Google’s Android operating systems is privacy. There’s just no comparison: Apple wins hands down. There are two reasons for this. First, Apple’s iOS is a very closed ecosystem, meaning that Apple exerts extreme control over what apps it will allow to run on the phone and what those apps are allowed to do when you can run them. This control is a source of major frustration for a lot of people. They want to be able to do whatever they want to do, even if that means taking more risks. You can have a spirited and healthy debate over the freedom and control aspects here, but the upshot is that Apple’s closed system and restrictive permissions ultimately gives you, the user, more protection from malicious and prying apps.

The other reason is that Google is an advertising company. Google’s business model is tied directly to knowing as much about you as possible. It’s a pure conflict of interest that I just can’t reconcile, and it’s the same reason I can’t recommend Google’s Chrome browser. While I firmly believe that Google is doing great things in the realm of security, it has shown time and time again that it will go to insane lengths to track everything you do to command top dollar for its advertising.

Wireless Madness

While laptop and desktop computers have their share of wireless technologies, smartphones have more. Modern cell phones have Wi-Fi, cellular data, Bluetooth, Near-Field Communication (NFC), and now even wireless charging. Every one of these wireless interfaces presents a potential chink in your smartphone’s armor—a gap that will allow the bad guys a way into your phone. Let’s quickly review each one.

For Internet access, your smartphone has two options: cellular data and Wi-Fi. Cellular data service comes with nearly every smartphone service plan. They usually sell it to you in monthly chunks of gigabytes (GB), with steep fees for exceeding your limits (unless you opt for the expensive “unlimited” plan). Cellular data is your default connection to the Internet from a smartphone and should be available in most populated areas. But because you are charged for what you use, you have to be somewhat careful about how you use it. Regular e-mail and web surfing is usually fine, but you wouldn’t want to binge-watch your favorite Netflix series using cellular data. Video services (YouTube, FaceTime, Netflix, etc.) can eat up a lot of data.

So, what if you do want to catch an episode of Game of Thrones on your iPhone? That’s where Wi-Fi comes in. As we discussed in Chapter 2, Wi-Fi is a wireless networking technology, giving you access to the Internet at home, in coffee shops, in hotels, in airports, in restaurants, and in other people’s homes. Wi-Fi service is generally unlimited and free. But as we’ve also discussed, public Wi-Fi hotspots are notoriously bad when it comes to security and privacy. If you’re just going to surf the Web or read e-mails, I recommend avoiding public Wi-Fi and just stick to using your cellular data plan. You can also use a virtual private network (VPN) service to protect your Wi-Fi traffic, but be aware that services like Netflix will now block you if you’re using a VPN (to prevent people from accessing their services from outside their home country).

Because the whole point of smartphones is to be unencumbered, they use wireless technologies for everything. This is where Bluetooth and NFC come into play. As we discussed in Chapter 2, Bluetooth is used to connect peripheral devices to your phone like headphones and keyboards without the need for pesky cords. NFC, on the other hand, is used for things like mobile payments and pairing of devices (sometimes Bluetooth devices). NFC tries to limit itself by physical proximity—hence the “near” part of Near Field Communications. The idea is that the user has to place the smartphone near the payment terminal or whatever; it can’t just connect while it’s in your pocket or purse. In reality, though, any radio frequency (RF) technology can work over longer distances in the right circumstances.

The last cord to cut is the power cord. Some smartphones (and other devices like the Apple Watch) have come up with clever ways to transfer power without cables. However, this usually requires very close proximity—like sitting on a special mat or stand—but hey, there are no wires! The appeal is that you don’t have to physically connect the power cord.

Unfortunately, all of these wireless technologies increase your cell phone’s attack surface—they’re just more avenues for hacking in. While these technologies seem fairly simple to use, they are quite complicated under the covers. To do what they need to do, they are quietly and constantly monitoring the airwaves for signals and often replying to wireless queries from other devices automatically. Most of these technologies require a unique wireless identifier to operate. But this has allowed some enterprising retailers and law enforcement types to track your device using this ID and, by extension, track you. Some stores have devices that monitor Wi-Fi from phones to monitor your movements in their stores—when you enter, how long you linger in front of that sale rack, and when you come back to the store a few days later to buy something. They may or may not be able to tie that wireless ID to your name, but they know it’s the same person each time because the Wi-Fi ID of your phone doesn’t change. Apple has tried to thwart this tracking by using random, temporary Wi-Fi ID’s, but it’s not clear how effective this is at defeating tracking.

To Hack or Not to Hack

As we’ve said, smartphones can be much more restrictive on what applications you can run or even what settings you can change. Cell phone makers and cellular providers do this mostly for security purposes—trying to protect people from themselves. But they also do this because they want to protect themselves and their business interests, often at the expense of their customers. It should be no surprise then that enterprising hackers have found ways to circumvent these restrictions, and they’ve made them available to the public via easy-to-use tools that you can find all over the Internet if you take the time to look.

The process of circumventing your smartphone’s built-in restrictions is a form of hacking called jailbreaking or rooting . Like regular computers, smartphones have different levels of permissions. Unlike regular computers, the cell phone makers and cell phone service providers reserve the highest permissions for themselves. Needless to say, this rubs some people the wrong way. “I bought the stupid device. Why can’t I do whatever I want with it?” If you get the right phone and the right hacking tool off the Internet, you can gain full administrator privileges and do whatever you want. While this sounds very tempting, I’m here to tell you that it’s not a good idea.

If you recall, in Chapter 5 I strongly encouraged you to create and use a nonadmin account on your computer. This follows the security practice of “least privilege.” You want to restrict what you can do in most cases to be the bare minimum, just in case some bad guy or piece of malware gains access to your account. By using a limited-access account, you can limit the amount of damage that can be done if that account is hijacked.

This is the same basic philosophy at work on smartphones. Apple and Google have created elaborate permission schemes on their smartphones that are designed to let you do everything you need to do while simultaneously restricting the damage that can be done by a rogue application or service. While some of these restrictions are more for their benefit (or the cell phone service provider’s benefit), on the whole they are the best mechanism for protecting your data and your privacy. Removing this safety mechanism will allow you to do whatever you want... but it also opens the door for any other application on your device to do what it wants. While I think there’s a strong philosophical argument to be made in favor of removing these restrictions—and I hope in the future cell phone makers return more of this power to the user—right now I think it’s safer for most users to leave these restrictions in place.

Privacy Matters

For me, privacy is far and away the most important topic related to smartphones today. These devices are with us almost every hour of every day and are in constant contact with the Internet. They know where we are, where we’ve been, who we know, who we talk to, how to access our bank accounts, what news we read, what we buy, what games we play, what pictures we like to look at, what we text and e-mail, what web sites we use, what’s on our schedule…the list is endless. Your phone probably contains or has access to credit card numbers, phone numbers, passwords, PINs, birth dates, passport info, and Social Security numbers. We keep all the information of our lives on our smartphones so that we can access it anywhere at any time.

According to a 2016 Pew poll, 28 percent of people still do not lock their smartphones with a PIN or other access control.1 While I hope that number has increased since then, I don’t doubt that a majority of people still haven’t taken this most basic step to secure this treasure trove of information.

Many modern smartphones now come with the ability to unlock your phone using a fingerprint. This presents an interesting dilemma. As we discussed in Chapter 4 on passwords, fingerprints are a form of biometric authentication. As opposed to something you know (a PIN or passcode), biometrics represent something that you are. PINs and passcodes are a pain in the butt, there’s no doubt. Having to enter even four digits to get into your phone all the time is annoying (and honestly, you should be using more than four). Using your index finger is much, much easier. But is it really secure?

First, realize that there are multiple ways that someone else can use your fingerprint. The most obvious way would be somehow compelling you to do it for them or knocking you out and pressing your finger to the sensor. But it turns out that it’s actually not that hard to pull a usable fingerprint from a smooth surface.

Second, there’s currently a distinct legal difference between a fingerprint and a password or PIN. This is an evolving area of law, and it probably varies country by country, but a fingerprint is viewed like a physical key. If law enforcement has a warrant to search your home, they can compel you to open the door with your key. But can they compel you to use your finger to unlock your cell phone? Currently, in the United States, the courts seem to be saying that they can. At the same time, the courts in the United States have upheld the Fifth Amendment right against self-incrimination for passwords and PINs—something you hold in your head and would have to communicate somehow to reveal.

And now we have face recognition, such as Apple’s Face ID. To unlock your phone, you just need to look at it. Personally, I find this to be inferior to fingerprints. The recognition can happen at a distance, and despite Apple’s claims to the contrary, it appears to be easier to fool than the fingerprint reader. This will surely improve over time, however.

So—as is often the case with security and privacy—you need to weigh the trade-offs with respect to convenience. While it’s much more convenient to use your finger or your face to unlock your smartphone, it doesn’t really offer you any protection from law enforcement or a physical attacker. That’s probably not a concern for most people, however, meaning that in most cases, using biometrics to unlock your phone is a worthwhile trade-off between convenience and security (especially compared to not locking your phone at all).

Summary

  • Our cell phones hold amazing amounts of extremely personal information. We need to realize this and take extra steps to protect this data.

  • Cell phones are wireless in just about every way and come with a bevy of technologies that allow them to function untethered. However, that also means there are extra avenues of attacks for bad guys.

  • Cell phone makers and service providers have restricted what users can do with their devices for both security and proprietary reasons. While it’s often possible to download tools that will circumvent these restrictions, for the average person this is not necessary and will expose you to a great deal of risk.

  • You should always lock your smartphone, either with a PIN, with a passcode, or with biometrics like a fingerprint or face scan. For most people, a biometric lock is a good balance between security and convenience, but if you’re really worried about your privacy, you need to use a passcode.

Checklist

The cell phone market—particularly the Android phone market—is extremely fractured. By that I mean there are many variants of the Android operating system out there, not only in the underlying version of the operating system itself (with tasty names like Oreo, Nougat, and Marshmallow) but also with respect to service providers. The cellular service companies like AT&T and Verizon often make their own customizations to the operating system. Even the smartphone manufacturers like Samsung and LG often customize the OS. This makes it difficult to provide a definitive, specific step-by-step guide. Therefore, most of the advice in this checklist is somewhat generic. You may need to search the Web or talk to your cellular service provider to help you find the proper way to do these things.

Remember the following:
  • Android is Google’s mobile operating system, used on devices from many different manufacturers including LG and Samsung (and of course Google).

  • iOS is Apple’s mobile operating system, used on iPhones and iPads.

Tip 11-1. Back Up Your Phone

If your phone is lost or stolen, you want to be able to recover the information it held. You can often use these backups to restore all of your apps, settings, and data to a new phone. You can also use the backup to go back to a known-good state if something goes horribly wrong.

Tip 11-1a. iOS

If you have a computer, I recommend backing up your iPhone to the computer using Apple’s iTunes application. You can do this on Mac OS (where iTunes is built in) and on Windows (where you need to download and install the iTunes application). You can back up your iPhone to iCloud (covered next), but you currently get only 5GB of free space.
  1. 1.

    If you need to install iTunes (on Windows), do that first.

     
  2. 2.

    Once iTunes is installed, connect your iOS device to your computer with the included USB cable.

     
  3. 3.

    The device should back up automatically when connected.

     
If you don’t have a computer, you’ll have to back up to iCloud. If you have more than 5 gigabytes of data (which isn’t hard to do), you will need to pay for more storage space (a monthly fee).
  1. 1.

    Go to Settings and then click your name at the top to access your account.

     
  2. 2.

    Find iCloud Backup and click it.

     
  3. 3.

    Turn on iCloud Backup.

     
  4. 4.

    Backups will happen only when connected to Wi-Fi.

     

Tip 11-1b. Android

For Android, there’s no one clean way to back up your entire phone. You can back up your basic settings by going to Settings ➤ Personal ➤ Backup and Reset. Select both the data backup and data automatic restore options. However, this will not back up your text messages, pictures, music, etc. There are many backup apps on the Google Play store. You will have to do a little research there to find a good one that meets your needs. If you connect your Android device to your computer with a cable, you should also be able to manually copy files from your Android device to your computer, but this is a pretty clumsy option for regular backups.

Tip 11-2. Keep Your Device Up-to-Date

Security problems are found all the time, and mobile device makers release updates on a fairly regular basis. You should be sure to update your device’s software whenever a newer version is available—this includes the operating system as well as applications.

Tip 11-2a. iOS

Apple’s iOS is free and easy to update. On your iPhone, go to Settings ➤ General ➤ Software Update to check your current version and see whether you have any updates.

Tip 11-2b. Android

On Android, it’s often difficult or impossible to update the OS. To check your version and see whether any updates are available, go to Settings ➤ About Phone. If there is an available software update, you should see it here.

Tip 11-3. Lock Your Device

I know this seems like a pain in the butt, but you absolutely need to lock your mobile devices. Anyone who picks up your device can access tons of personal information, so you need to erect a digital barrier—either a PIN or passcode (most secure) or a biometric lock (fingerprint or face scan). Some devices allow you to enter a full-on password, which is obviously the most secure way to go. However, since unlocking the device requires physical access, a four-digit PIN will be sufficient for most people.

If your phone has the option to wipe all data after a certain number of incorrect attempts to unlock, I encourage you strongly to enable this feature, as well. You can store this PIN/passcode in LastPass if you’re afraid you’ll forget it. All Apple phones have this feature. Go to Settings ➤ Touch ID & Passcode. Scroll all the way down to Erase Data and enable the feature.

Tip 11-4. Don’t Use Biometric Locks for Sensitive Stuff

One of the nifty features on newer mobile devices gives you the ability to unlock it using fingerprint or facial recognition. This is undoubtedly easier than having to type in a PIN or password, but using biometrics is not as secure. Not to sound paranoid, but these techniques work just fine even if you’re not conscious. Also, while the law is still not 100 percent settled on this, recent cases have concluded that a law enforcement officer can compel you to unlock a device using biometrics, but they cannot force you to divulge your PIN or passcode.2

Tip 11-5. Dial Down What Your Apps Can Access

Both iOS and Android have gotten really good about forcing application makers to explicitly ask for access to various features of your phone such as the microphone, the video camera, your contact list, your location, and so on. Practice the policy of least privilege and deny permission to any app that doesn’t absolutely need such access. It makes sense for a weather app to want access to your location because you usually care most about the weather where you are. However, why in the world would that same weather app need access to your address book or the microphone? Usually these apps ask for permission when you install them or perhaps when you first run them. At the time of this writing, Apple’s iOS provides a lot more flexibility on what you allow each app to access and give you the ability to change these options after the fact. With Android, it’s often all or nothing, and you may not be able to change your mind later. Apple also allows you to control some things based on whether the app in question is in the foreground (that is, it’s the app you’re using right now—the one “on top”). Google has announced similar abilities in current and coming updates to Android, but right now iOS still provides the most control.

Note that some applications may fail to work after removing permissions—either because they really do need access to the thing you just cut off or because they didn’t design their app to deal with people who want to protect their privacy. So, you may have to go through a little trial and error with these settings.

Tip 11-5a. iOS

For iOS devices (iPhone/iPad), go to Settings ➤ Privacy. There you will find a long list of the things that iOS allows you to restrict. You’re going to want to go through each category and carefully select which applications should have access to which services. You can always change your mind later.

Tip 11-5b. Android

For Android devices running version 6.0 (Marshmallow) or later, you can go to Settings ➤ Apps (or Application Manager). You’ll see a list of apps where you can enable or disable permissions.

Tip 11-6. Limit Ad Tracking

Sadly, both Apple (iOS) and Google (Android) now have some form of ad tracking. You can turn some of this off or down, however.

Tip 11-6a. iOS

Go to Settings ➤ Privacy ➤ Advertising. Enable the button for “limit ad tracking.” From time to time, you might want to also reset your Advertising Identifier (click the link below the tracking switch).

Tip 11-6b. Android

On Android, you can elect not to log into your Google account from your phone. However, this will probably prevent you from getting the most out of Google’s services. You should also go to Settings ➤ Ads and opt out of interest-based ads. From time to time, you might want to also reset your advertising ID (in the same settings panel).

Tip 11-7. Remove Unused Apps

How many apps do you actually use on your smart device? If you’re like me, you’ve probably accumulated dozens of “free trial” or “free today only” apps that you never use. You might think it’s harmless to leave those apps sitting dormant on your device, but the truth is that those apps are probably getting automatically updated all the time—and who knows what version 2.0 does? Maybe it has a cool new “friends” feature that contacts everyone in your address book or starts recommending recipes depending on your current location. With every software update, there are potential risks of software bugs that bad guys can exploit, too.

The opposite problem may also bite you: the app is abandoned and never updated. What if there’s a known security bug that goes unfixed?

Bottom line: if you’re not using an app, delete it. You can always re-install it later if you find that you want it back. In most cases, once you buy it, it’s yours for life, and the app store will allow you to download it again. This will have the added benefit of saving precious space on your device.

Tip 11-8. Enable (Self) Tracking

Similar to Find My Mac (see Chapter 5), Apple phones have a neat feature called Find My iPhone that will allow you to locate (on a map) a lost or stolen device. This feature will even allow you to remotely lock or wipe that device, if necessary. Android offers a similar service called Android Device Manager. You can also find apps on the Google Play Store like Prey that offer similar features, but I would use the Android Device Manager if it’s available to you.

Note that for these features to work, the device must be connected to the Internet somehow. For smartphones, this is usually not a problem, but for Wi-Fi-only devices (like many tablets and devices like the iPod Touch), you need to make a tough choice: either set your device to always try to connect to whatever Wi-Fi it can find (not as secure) or give up on this feature. However, if you use the next tip, you should feel better about letting it connect to anything.

Tip 11-8a. iOS

On your iOS device, go to Settings ➤ iCloud and scroll down to Find My iPhone. Enable the feature, including the “send last location” option.

Tip 11-8b. Android

On Android, go to Settings and find the Permissions section. Select Security and then Device Administration. Enable Android Device Manager. If you can’t find it here, try launching the Google Settings app, find Security, and then enable Android Device Manager.

Tip 11-9. Use the DuckDuckGo Mobile Browser

DuckDuckGo started out as a privacy-oriented search engine but has since released several new privacy-enhancing tools including a mobile phone browser. While you unfortunately can’t replace Safari as the default browser on iOS (that is, change which browser is launched when you click a link in some other app), you can at least install and use DuckDuckGo’s browser for direct searches and manually pasted web links. On Android, you will have the option to make DuckDuckGo your default browser.

Tip 11-10. Use the LastPass Browser, Too

If you need to visit a web site on your mobile device that requires a password, you should consider using the web browser that’s built into the LastPass mobile app. Just open LastPass on your smartphone and click the Browser button at the bottom.

You can also try using the LastPass extension for Safari and for Chrome. It will allow you to enter usernames and passwords directly in these browsers. See this helpful article to set it up:

Currently, for all other situations, you will need to copy and paste your password from the LastPass app into other apps where needed.

Apple realized that this is a royal pain and there will be welcome changes coming in iOS 12 (due out in the fall of 2018) that will fix this. You’ll be able to automatically fill in LastPass information into any application!3

Tip 11-11. Avoid Cheap Android Phones

There have been several reported cases of cheap Android phones coming pre-installed with adware, spyware, and even straight-up malware—right out of the box. Some of the best-known manufacturers are ZTE, Archos, myPhone, and BLU. Don’t cut corners on buying a smartphone. Stick to well-known name brands.

Tip 11-12. Use Secure Messaging Apps

While Apple’s iMessage is relatively secure, there are better apps out there, if you really want your messages to be private (that is, encrypted from end to end). Unfortunately, everyone you want to communicate with will also need to download and install the same app—because we don’t have a standard yet. These apps are available for both iOS and Android, as well as for your computer, so you can actually message from any device to any device.

Tip 11-13. Install (and Use) a Mobile VPN

Virtual private networks aren’t just for laptops. While most banking and shopping apps on your phone already use encrypted connections, your e-mail and web surfing may very well be completely open and unencrypted. And when you’re using the free Wi-Fi at Starbucks, McDonald’s, your hotel lobby, or wherever, all that data is completely visible to anyone else in the area with a simple wireless monitoring application. If you have a VPN app installed, it should automatically kick in whenever your device tries to connect to an unknown (and therefore untrusted) network. Fair warning: good VPN services usually cost money. I guarantee you will find situations where it will frustrate you because it won’t connect. This is the usual trade-off between security and convenience. But if you find yourself having problems connecting and you specifically need Wi-Fi (versus cellular data), you can always elect to temporarily disable the VPN.

One note…don’t use Facebook’s VPN (Onavo). If you select the Protect option in the Facebook app, it will prompt you to install the Onavo VPN , a service owned by Facebook. This gives Facebook complete information on everything you do on the Internet, and its “privacy” policy explicitly says that it will collect and use this info.

Look at Chapter 6 for recommendations on good VPN services.

Tip 11-14. Know Your Rights When You Travel

For some reason, normal property and privacy laws seem to be thrown out of the window when you cross a border. For example, current U.S. law says that border agents can confiscate and search an electronic device for any reason and for as long as they want. Because of our preoccupation with terrorist threats, border guards have been given a lot of leeway, shall we say. There are laws in the works to curb this, but until then, you can find some great information at this EFF web site:

Tip 11-15. Don’t Hack Your Device

Because mobile devices have so many restrictions on what you’re allowed to do, what apps you can install, and so on, many people have turned to rooting or jailbreaking their devices to get around these constraints. Having root privileges on a computer means you can basically do anything you want. The problem is that once you’ve hacked a device and given yourself root access, you have opened the door for other apps to abuse that same privilege level. This exposes you to all sorts of foul play. I strongly recommend you avoid doing this.

Tip 11-16. Disable Bluetooth and NFC When You Can

Bluetooth is the odd name of a versatile, short-range, low-power wireless technology that allows your mobile device to connect wirelessly to external devices such as speakers, hands free headsets, keyboards, and more. You can even use it to unlock your front door! However, leaving Bluetooth on all the time means that rogue devices can also try to connect to your device without your knowledge. These connections can be used to steal your data and potentially even compromise your device. While Bluetooth is fairly secure and these attacks are not common, it’s still a good idea to just disable Bluetooth unless you’re using it. It will also help you save your battery.

Near Field Communications (NFC) is another wireless technology built into many mobile devices, though used less often and at much shorter distances. While Bluetooth can work at distances of dozens of feet, NFC generally is limited to maybe an inch or less (hence the “near” part). It’s usually used to pair your phone with another device—maybe to get a Wi-Fi password or trigger a mobile payment app or even transfer a file from one phone to another. Like any wireless technology, it can be broadcasting and listening all the time to any nearby device, making it a possible “way in” to your phone. Disable this feature if you’re not using it.

Tip 11-17. Erase Your Device Before Getting Rid of It

Like our home computer, our mobile devices are chock-full of detailed personal information. In fact, our cell phones arguably have way more info in (or accessible by) them. So, before you give away or sell or even recycle your smartphone, you should be sure to wipe it completely. If you’ve encrypted the contents, you’re most of the way there already. But it’s still good to wipe it clean.

Tip 11-17a. iOS

  1. 1.

    Be sure to run a full backup of your iPhone before you do anything. Connect your iPhone or iPad to your computer and let iTunes back it up (or if you use iCloud Backup, make sure it has backed everything up recently). You can use this backup to transfer all the data to a new device. In fact, if you’re going to do that, be sure to do that first before going any further.

     
  2. 2.

    Go to Settings and click your name/picture at the top. Scroll down to the bottom and sign out. Follow the instructions to delete all your iCloud data from your iPhone.

     
  3. 3.

    Go to Settings ➤ General and scroll all the way down to the bottom. Select Reset. Then select Erase All Content and Settings. If you’ve signed up for Find My iPhone, you may have to enter your Apple ID and password to disable this feature. Follow any other prompts to enter passwords, PIN codes, etc.

     
  4. 4.

    See this helpful Apple article for more info:

    https://support.apple.com/en-us/HT201351

     

Tip 11-16b. Android

Unfortunately, Android devices can be very different from one another in terms of settings. This is partially because of different versions of the OS, but it’s also because Android allows service providers a lot of leeway in customizing the device. If you have trouble with any of these steps, go into your local cell phone provider and ask for help.
  1. 1.

    Be sure to run a full backup of your phone or tablet before you do anything. You may need to transfer that data to another device. If you have the new device, do this transfer first before doing anything else.

     
  2. 2.

    If you have a removable SIM card (the little card the cell phone service provider put in there to identify you), remove it.

     
  3. 3.

    If you have any removable storage (SD card), be sure to remove it.

     
  4. 4.

    Log out of any services and accounts you use: e-mail, messaging, social media, cloud storage, music services, etc. You may do this through Settings, or you may have to do it through each application.

     
  5. 5.

    If you haven’t encrypted your device, do that now. It will make sure that even if you miss something here that no one else will be able to find it. This should be under the Security settings.

     
  6. 6.

    Perform a factory reset. Find the Backup and Reset area under Settings. There may be lots of options here—select the ones that make sense. Then find and click the “Reset device” or “Reset phone” button.

     
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.14.247.5