How To be Anonymous In A Protest | Burner Phone Tutorial
The Hated One The Hated One
431K subscribers
42,237 views
0

 Published On Mar 27, 2022

If you want to attend a protest, you have to become unidentifiable. This is how you do it.
Become a producer of independent research and analysis by joining my Patreon page:   / thehatedone  

Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live.

Your phone has four main radio signals, all of which can compromise your security:
• Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts.
• WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time.
• Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload.
• GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone.

Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable.

What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical security. Make sure to follow and understand every step in both of these parts as they are both equally required to remain anonymous.

Sources
EFF's guide on attending a protest: https://ssd.eff.org/en/module/attendi...
IMSI Catchers: https://www.eff.org/wp/gotta-catch-em...
- Stingrays: https://www.wired.com/2015/10/stingra...
- https://www.wired.com/2014/06/feds-to...
How to prepare your phone for a protest: https://themarkup.org/ask-the-markup/...
Protest privacy - photos: https://themarkup.org/ask-the-markup/...
Burner Phone tutorial by The Intercept: https://theintercept.com/2020/06/15/p...
Rogue WIFI hotspots: https://www.forbes.com/sites/andygree...
Dataminers spy on social media: https://theintercept.com/2020/07/09/t...
Anonymous Twitter account: https://theintercept.com/2017/02/20/h...
Facial recognition in Hong Kong protest: https://www.nytimes.com/2019/07/26/te...

List of all apps and services mentioned (no affiliation)
GrapheneOS: https://grapheneos.org/
- Download: https://grapheneos.org/releases
- Install: https://grapheneos.org/install

F-Droid: https://f-droid.org/
Orbot: https://guardianproject.info/apps/org...
Tor Browser: https://www.torproject.org/
Aurora Store: https://f-droid.org/en/packages/com.a...

KeepassDX: https://github.com/Kunzisoft/KeePassDX
Tutanota: https://tutanota.com/
Protonmail: https://protonmail.com/
SimpleLogin: https://simplelogin.io/
Aegis Authenticator: https://getaegis.app/
Signal: https://signal.org/
Briar: https://briarproject.org/
Wire: https://wire.com/en/
Anonymous Twitter: https://twitter3e4tixl4xyajtrzo62zg5v...
Scrambled Exif: https://f-droid.org/en/packages/com.j...
ImagePipe: https://f-droid.org/en/packages/com.j...
ObscuraCam: https://guardianproject.info/apps/obs...
OsmAnd: https://osmand.net/

Credits
Music By: White Bat Audio    / whitebataudio  

Follow me:
  / the_hatedone_  
  / thehatedone  

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

show more

Share/Embed