• Latest
  • All
  • How To
How to Secure Your Phone and Yourself During Protests

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025
Android Canary release channel

Google Launches Android Canary Release Channel for Developers

July 11, 2025
Japan Internet Speed

Japan Records World’s Fastest Internet Speed at 1.02 petabits Per Second

July 11, 2025
Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025
YouTube AI slop is getting demonetized

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025
DHgate Tablet Cases deals
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025
Former X CEO, Linda Yaccarino

Linda Yaccarino Steps Down as CEO of X After Two Years

July 9, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

How to Secure Your Phone (and Yourself) During Protests

Caleb Sama by Caleb Sama
June 25, 2025
in How To
Reading Time: 10 mins read
301
0
How to Secure Your Phone and Yourself During Protests

Credits: AFP

Protests are a fundamental right in democratic societies, but in Kenya, as we’ve witnessed lately, exercising this right can put your life at risk. This should not be the case, but unfortunately, we’ve learned very painful and bloody lessons to ignore this fact.

We can write all the tech reviews and opinions we want, but if we’re not helping you, our dear readers, learn how technology can make your life not only simpler but SAFER, we have failed.

That said, we decided to create a detailed guide on how you can use the tech available to you to keep you (and your loved ones) safe during maandamano.

We’ve made it as simple as possible by creating bullet points instead of a whole essay (we’re very aware of the effect TikTok has had on our attention spans).

A lot of our focus will be on smartphones. Though they’re very powerful devices for documenting and organizing, they can also become a liability if you fail to secure them properly.

Therefore, without further ado, here’s a complete guide on how to secure your phone (and yourself) during protests while making your voice heard.

Before You Hit the Streets

Lock Down Your Device

Set Up Bulletproof Encryption

  • Enable full-disk encryption to secure your phone immediately before attending any protests
  • Create a strong password with 8-12 random characters that you can easily remember and type quickly
  • Skip the simple PINs. They’re really not as secure as you think they are

Ditch the Biometrics

  • Turn off fingerprint and face unlock features completely
  • Police can easily force you to unlock your phone using your face or finger (be it legally or illegally)
  • A password in your head is much harder to extract than a finger they can grab

Install Signal for Secure Communication

  • Download Signal for end-to-end encrypted messaging and calls
  • Set up disappearing messages so conversations don’t remain on your device
  • Create group chats with fellow protesters for your own safety. This will help you keep tabs on everyone attending the protests
  • Remember: Even secure apps can reveal your location. However, they make it more difficult for people who want to track you

Create Backup Plans for Your Phone

Protect the Data on Your Phone

  • Back up everything important before you leave home
  • Store backups in a secure location separate from your phone (like a flash drive) before attending protests
  • Enable Advanced Data Protection on iCloud if you’re an iPhone user
  • Choose zero-knowledge backup services for Android devices

Consider a Burner Phone Strategy

  • We know this sounds like something straight out of a movie, but if you can, buy a cheap feature phone (kabambe) – with cash if possible
  • Use a temporary number, which you can share with trusted contacts
  • Turn off the burner phone before heading home to avoid location correlation
  • If you can afford to, dispose of it safely away from your usual locations when done

Dress for Anonymity

Become Invisible in Plain Sight

  • Wear dark, monochrome clothes to blend into crowds
  • Cover distinctive tattoos, bright hair colors (ladies, please leave those colorful wigs at home), and any other unique features
  • Coordinate with your group of friends to dress in a similar fashion

When You’re on the Ground

Master How to Take Photos With Stealth

Document Without Compromising Security

  • Use your camera without unlocking your phone (add the camera feature to the lock screen)
  • Keep your phone locked and secure as much as possible during the protests
  • Consider bringing a separate digital camera for better photo quality (you can bring your DSLR if you feel confident about keeping it safe)

Protect Your Fellow Protesters

  • Blur or block out faces of other demonstrators in your photos
  • Hide identifying features like unique clothing or accessories
  • Use Signal’s built-in blurring tool or dedicated apps like Image Scrubber

Your photos could be used to identify and target others, so be responsible when sharing any form of media.

Strip Away Digital Breadcrumbs

Clean Your Photo Metadata

  • Remove location data, timestamps, and device information from images
  • Take screenshots of photos to strip metadata quickly
  • Send photos to yourself through Signal to automatically remove metadata
  • Never EVER post raw photos directly from your camera

Use Public and Private Transport in a Smart Way

Avoid the Digital Paper Trail

  • For days such as this, use cash for public transportation instead of linked payment cards like mobile money and cards
  • Consider walking (if you can) to avoid license plate readers
  • Be aware that your regular car’s plates can be easily tracked using automated systems
  • Plan alternative routes home to minimize exposure to surveillance

Control Any Chatter on Your Phone

Go For a Full Communication Blackout

  • Enable airplane mode, then manually turn off Wi-Fi and Bluetooth
  • Disable all location services completely
  • Turn off your phone entirely for maximum protection
  • Download offline maps before going for protests

If Things Go Wrong

Know Your Rights During Arrest

  • Clearly state that you do not consent to phone searches. Your phone is your property
  • Refuse to provide passwords or unlock your device
  • Understand that biometric locks can be forced; passwords cannot
  • Accept that your phone may be seized, but your consent won’t be

Damage Control After Your Devices Are Confiscated

Cut Off Access Immediately

  • Time is both your friend and foe in this situation
  • Change passwords for all accounts logged in on your device
  • Revoke device access from social media (very important) and other services
  • Monitor login logs for unauthorized access
  • Consult with a legal advisor before taking any action that might be seen as obstruction

Legal Recovery Options

  • Work with a legal advisor to file motions for the return of any devices seized during protests (this only works if you have information on who seized it)
  • Understand that devices with potential evidence for illegal activity may be held longer
  • Document everything for potential future legal proceedings

Secure Apps and Services To Go For

Essential Security Apps

  • Signal for messaging
  • Tor browser for anonymous web browsing
  • DuckDuckGo for searches that don’t track you or leave browser history
  • Avoid Chrome and other data-hungry browsers

Safety on Social Media

  • Create separate accounts using anonymous email addresses
  • Enable two-factor authentication (2FA) on all accounts
  • Consider temporary accounts specifically for protests
  • NEVER link protest accounts to your real identity

Advanced Protection Strategies You Can Use

Use Guided Access or App Pinning

  • Lock your phone to a single app (consider camera, Signal, or any other app indicated above)
  • Prevent unauthorized access to other apps if you need to show your screen to someone
  • For iOS: Enable Guided Access in Accessibility settings
  • For Android: Use App Pinning in Security settings

VPNs Are Better Than No VPNs

  • Choose a paid VPN service over a free one
  • Encrypt all your internet traffic
  • Hide your real IP address and location
  • Set it up before you need it, not during the protests

The Nuclear Option (Or What We Like to Call, “The Best Option”)

Sometimes the best digital security is no digital device at all. Even Snowden can attest to this.

Consider leaving your phone at home entirely if:

  • The protests have a chance of being infiltrated by rogue elements (they can undermine all efforts to secure your phone)
  • You’re concerned about being specifically targeted
  • The risk of losing your devices is high (and it’s not a price you’re willing to pay)

Coordinate with friends beforehand about where to meet and timing if you’re going phone-free.

Our Final Word to You

Please remember that security isn’t about making the perfect safeguards. It’s more about making yourself a harder target than the person next to you. Every precaution you take raises the bar for anyone trying to access your information and data or track your activities.

The most important thing to keep in mind is that these tools and techniques are only as good as your commitment to using them consistently. Practice how to do these steps before you need them, stay informed about new threats and protections, and always prioritize the safety of yourself and fellow protesters.

Your right to protest is fundamental, but being safe while doing so requires preparation, vigilance, and making the right decisions. We have done our part to inform. Now, it’s up to you!

Tags: AndroidCybersecurityData PrivacyData SecurityiOSSurveillance
SendShare168Tweet105
Caleb Sama

Caleb Sama

Friendly neighborhood films, games, and tech reviewer. Expect dad jokes - lots of dad jokes.

Related Posts

Android Canary release channel

Google Launches Android Canary Release Channel for Developers

July 11, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Open TV

Open TV Brings Fast and Ad-Free IPTV to Android

July 7, 2025
ios 26-facetime

iOS 26 May Pause Video if You Start Undressing on FaceTime

July 3, 2025
DeepSeek_vs_ChatGPT

Hackers Build Malware That Tries to Reprogram AI Security Tools

July 1, 2025
tackling Bank Fraud, Sextortion, and Ransomware in Kenya

Kenya Facing Rise in Cyberthreats from Bank Fraud, Sextortion, and Ransomware

July 1, 2025

Latest

Android Canary release channel

Google Launches Android Canary Release Channel for Developers

July 11, 2025
Japan Internet Speed

Japan Records World’s Fastest Internet Speed at 1.02 petabits Per Second

July 11, 2025
Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025
YouTube AI slop is getting demonetized

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Google Launches Android Canary Release Channel for Developers

July 11, 2025

Japan Records World’s Fastest Internet Speed at 1.02 petabits Per Second

July 11, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

Vivo Y29 Launches in Kenya at KES 23,999

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

Rockstar May Be Testing 96-Player Servers for GTA 6

Linda Yaccarino Steps Down as CEO of X After Two Years

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.