• Latest
  • All
  • How To
How to Secure Your Phone and Yourself During Protests

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025
xiaomi

Xiaomi June 26 Mega Launch: From EVs to Foldables

June 24, 2025
All-Screen-iPhone-2027-Apple

Apple Reportedly Working on an All-Screen iPhone

June 24, 2025
Unified Payment Interface

CBK’s New Fast Payment System Plan Could Rival M-Pesa

June 24, 2025
Starlink

Starlink Resumes Sign-Ups in Nairobi After 7-Month Freeze

June 24, 2025
DHgate Tablet Cases deals
ASUS ROG Flow Z13

ASUS ROG Flow Z13 Proves Portability and Power Can Coexist

June 24, 2025
Infinix InBook Air

Infinix InBook Air Review: Perfect Laptop for Students and Simple Workflows

spotify-mobile

Spotify Lossless HiFi Update Nears Reality After Years of Delay

June 23, 2025
whatsapp

WhatsApp Is Testing a New AI Tool To Help Users Write Texts

June 23, 2025
SHIF Status

How to Check Your SHIF Status in Kenya: A Complete Guide

June 23, 2025
youtube google ai

Google Finally Admits To Using YouTube Videos To Train Its AI Models

June 23, 2025
Microsoft AI for Good Lab tool GIRAFFE

How Microsoft’s AI for Good Lab Is Helping Save Giraffes from Extinction

June 20, 2025
itel City 100

Gen Z Get a New Budget AI Smartphone With the itel City 100

June 20, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

How to Secure Your Phone (and Yourself) During Protests

Caleb Sama by Caleb Sama
June 25, 2025
in How To
Reading Time: 10 mins read
265
0
How to Secure Your Phone and Yourself During Protests

Credits: AFP

Protests are a fundamental right in democratic societies, but in Kenya, as we’ve witnessed lately, exercising this right can put your life at risk. This should not be the case, but unfortunately, we’ve learned very painful and bloody lessons to ignore this fact.

We can write all the tech reviews and opinions we want, but if we’re not helping you, our dear readers, learn how technology can make your life not only simpler but SAFER, we have failed.

That said, we decided to create a detailed guide on how you can use the tech available to you to keep you (and your loved ones) safe during maandamano.

We’ve made it as simple as possible by creating bullet points instead of a whole essay (we’re very aware of the effect TikTok has had on our attention spans).

A lot of our focus will be on smartphones. Though they’re very powerful devices for documenting and organizing, they can also become a liability if you fail to secure them properly.

Therefore, without further ado, here’s a complete guide on how to secure your phone (and yourself) during protests while making your voice heard.

Before You Hit the Streets

Lock Down Your Device

Set Up Bulletproof Encryption

  • Enable full-disk encryption to secure your phone immediately before attending any protests
  • Create a strong password with 8-12 random characters that you can easily remember and type quickly
  • Skip the simple PINs. They’re really not as secure as you think they are

Ditch the Biometrics

  • Turn off fingerprint and face unlock features completely
  • Police can easily force you to unlock your phone using your face or finger (be it legally or illegally)
  • A password in your head is much harder to extract than a finger they can grab

Install Signal for Secure Communication

  • Download Signal for end-to-end encrypted messaging and calls
  • Set up disappearing messages so conversations don’t remain on your device
  • Create group chats with fellow protesters for your own safety. This will help you keep tabs on everyone attending the protests
  • Remember: Even secure apps can reveal your location. However, they make it more difficult for people who want to track you

Create Backup Plans for Your Phone

Protect the Data on Your Phone

  • Back up everything important before you leave home
  • Store backups in a secure location separate from your phone (like a flash drive) before attending protests
  • Enable Advanced Data Protection on iCloud if you’re an iPhone user
  • Choose zero-knowledge backup services for Android devices

Consider a Burner Phone Strategy

  • We know this sounds like something straight out of a movie, but if you can, buy a cheap feature phone (kabambe) – with cash if possible
  • Use a temporary number, which you can share with trusted contacts
  • Turn off the burner phone before heading home to avoid location correlation
  • If you can afford to, dispose of it safely away from your usual locations when done

Dress for Anonymity

Become Invisible in Plain Sight

  • Wear dark, monochrome clothes to blend into crowds
  • Cover distinctive tattoos, bright hair colors (ladies, please leave those colorful wigs at home), and any other unique features
  • Coordinate with your group of friends to dress in a similar fashion

When You’re on the Ground

Master How to Take Photos With Stealth

Document Without Compromising Security

  • Use your camera without unlocking your phone (add the camera feature to the lock screen)
  • Keep your phone locked and secure as much as possible during the protests
  • Consider bringing a separate digital camera for better photo quality (you can bring your DSLR if you feel confident about keeping it safe)

Protect Your Fellow Protesters

  • Blur or block out faces of other demonstrators in your photos
  • Hide identifying features like unique clothing or accessories
  • Use Signal’s built-in blurring tool or dedicated apps like Image Scrubber

Your photos could be used to identify and target others, so be responsible when sharing any form of media.

Strip Away Digital Breadcrumbs

Clean Your Photo Metadata

  • Remove location data, timestamps, and device information from images
  • Take screenshots of photos to strip metadata quickly
  • Send photos to yourself through Signal to automatically remove metadata
  • Never EVER post raw photos directly from your camera

Use Public and Private Transport in a Smart Way

Avoid the Digital Paper Trail

  • For days such as this, use cash for public transportation instead of linked payment cards like mobile money and cards
  • Consider walking (if you can) to avoid license plate readers
  • Be aware that your regular car’s plates can be easily tracked using automated systems
  • Plan alternative routes home to minimize exposure to surveillance

Control Any Chatter on Your Phone

Go For a Full Communication Blackout

  • Enable airplane mode, then manually turn off Wi-Fi and Bluetooth
  • Disable all location services completely
  • Turn off your phone entirely for maximum protection
  • Download offline maps before going for protests

If Things Go Wrong

Know Your Rights During Arrest

  • Clearly state that you do not consent to phone searches. Your phone is your property
  • Refuse to provide passwords or unlock your device
  • Understand that biometric locks can be forced; passwords cannot
  • Accept that your phone may be seized, but your consent won’t be

Damage Control After Your Devices Are Confiscated

Cut Off Access Immediately

  • Time is both your friend and foe in this situation
  • Change passwords for all accounts logged in on your device
  • Revoke device access from social media (very important) and other services
  • Monitor login logs for unauthorized access
  • Consult with a legal advisor before taking any action that might be seen as obstruction

Legal Recovery Options

  • Work with a legal advisor to file motions for the return of any devices seized during protests (this only works if you have information on who seized it)
  • Understand that devices with potential evidence for illegal activity may be held longer
  • Document everything for potential future legal proceedings

Secure Apps and Services To Go For

Essential Security Apps

  • Signal for messaging
  • Tor browser for anonymous web browsing
  • DuckDuckGo for searches that don’t track you or leave browser history
  • Avoid Chrome and other data-hungry browsers

Safety on Social Media

  • Create separate accounts using anonymous email addresses
  • Enable two-factor authentication (2FA) on all accounts
  • Consider temporary accounts specifically for protests
  • NEVER link protest accounts to your real identity

Advanced Protection Strategies You Can Use

Use Guided Access or App Pinning

  • Lock your phone to a single app (consider camera, Signal, or any other app indicated above)
  • Prevent unauthorized access to other apps if you need to show your screen to someone
  • For iOS: Enable Guided Access in Accessibility settings
  • For Android: Use App Pinning in Security settings

VPNs Are Better Than No VPNs

  • Choose a paid VPN service over a free one
  • Encrypt all your internet traffic
  • Hide your real IP address and location
  • Set it up before you need it, not during the protests

The Nuclear Option (Or What We Like to Call, “The Best Option”)

Sometimes the best digital security is no digital device at all. Even Snowden can attest to this.

Consider leaving your phone at home entirely if:

  • The protests have a chance of being infiltrated by rogue elements (they can undermine all efforts to secure your phone)
  • You’re concerned about being specifically targeted
  • The risk of losing your devices is high (and it’s not a price you’re willing to pay)

Coordinate with friends beforehand about where to meet and timing if you’re going phone-free.

Our Final Word to You

Please remember that security isn’t about making the perfect safeguards. It’s more about making yourself a harder target than the person next to you. Every precaution you take raises the bar for anyone trying to access your information and data or track your activities.

The most important thing to keep in mind is that these tools and techniques are only as good as your commitment to using them consistently. Practice how to do these steps before you need them, stay informed about new threats and protections, and always prioritize the safety of yourself and fellow protesters.

Your right to protest is fundamental, but being safe while doing so requires preparation, vigilance, and making the right decisions. We have done our part to inform. Now, it’s up to you!

Tags: AndroidCybersecurityData PrivacyData SecurityiOSSurveillance
SendShare148Tweet92
Caleb Sama

Caleb Sama

Friendly neighborhood films, games, and tech reviewer. Expect dad jokes - lots of dad jokes.

Related Posts

Android 16

Google Releases Android 16 Early with Powerful New Tools

June 11, 2025
Social media surveillance

New Proposal to Give DCI KES 150M to Track Social Media Users

June 11, 2025
Apple-WWDC25-iOS-26

Apple Unveils iOS 26: A Redesign with Liquid Glass and Integrated AI

June 10, 2025
ios 26 apple

iOS 26: New Features To Expect Ahead of June 9 Launch

June 9, 2025
google-ai-edge-gallery

New Google App Lets You Use AI Offline on Android

June 5, 2025
adobe-photoshop-iphone

Adobe Launches Photoshop Beta App for Android

June 5, 2025

Latest

How to Secure Your Phone and Yourself During Protests

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025
xiaomi

Xiaomi June 26 Mega Launch: From EVs to Foldables

June 24, 2025
All-Screen-iPhone-2027-Apple

Apple Reportedly Working on an All-Screen iPhone

June 24, 2025
Unified Payment Interface

CBK’s New Fast Payment System Plan Could Rival M-Pesa

June 24, 2025
Starlink

Starlink Resumes Sign-Ups in Nairobi After 7-Month Freeze

June 24, 2025
ASUS ROG Flow Z13

ASUS ROG Flow Z13 Proves Portability and Power Can Coexist

June 24, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025

Xiaomi June 26 Mega Launch: From EVs to Foldables

June 24, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Infinix InBook Air Review: Perfect Laptop for Students and Simple Workflows

Spotify Lossless HiFi Update Nears Reality After Years of Delay

WhatsApp Is Testing a New AI Tool To Help Users Write Texts

How to Check Your SHIF Status in Kenya: A Complete Guide

Google Finally Admits To Using YouTube Videos To Train Its AI Models

How Microsoft’s AI for Good Lab Is Helping Save Giraffes from Extinction

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.