Logo
latest

Accounts and authentication

  • Introduction
  • Use a SIM PIN
  • Unlock with a password
  • Audit and change password reuse
  • Automagically create strong passwords
  • Enable MFA/2FA on sites you use

Services and applications

  • Introduction
  • Audit and block the access apps have to data and devices
  • Remove unwanted third party apps (UAPs)
  • Block apps from accessing Bluetooth data
  • Check for unknown configuration profiles
  • Secure browsers that protect your privacy
  • Change your browser app
  • Use a secure messaging service
  • Use secure email services
  • Use SSH tunnels
  • Use a VPN service
  • Use a Tor proxy
  • Change MAC address
  • Edit hosts file

Data

  • Introduction
  • Encrypt the data
  • Worst case, nuke all data

Privacy

  • Introduction
  • Silence spam callers
  • Change your search engine

Malware

  • Introduction
  • Install a third party scanner
  • Scan and clean machine
  • Analysing trojans

Operations security

  • Introduction
  • Don’t get juice-jacked
  • Do not auto-join Wi-Fi networks
  • Use email securely
  • Detecting fake emails and phishing
  • Browse more safely
  • Measure Internet Censorship
  • ‘;–have i been pwned?

Guards! Guards!

  • Introduction
  • Lockdown Privacy
Hardening iOS
  • iOS hardening
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Hardening iOS

Keeping it as simple as possible. iOS evolves fast. An old and new iPhone are underway for further pentesting, after which these mitigations will be updated (when we have time).

Accounts and authentication

  • Introduction
  • Use a SIM PIN
  • Unlock with a password
  • Audit and change password reuse
  • Automagically create strong passwords
  • Enable MFA/2FA on sites you use

Services and applications

  • Introduction
  • Audit and block the access apps have to data and devices
  • Remove unwanted third party apps (UAPs)
  • Block apps from accessing Bluetooth data
  • Check for unknown configuration profiles
  • Secure browsers that protect your privacy
  • Change your browser app
  • Use a secure messaging service
  • Use secure email services
  • Use SSH tunnels
  • Use a VPN service
  • Use a Tor proxy
  • Change MAC address
  • Edit hosts file

Data

  • Introduction
  • Encrypt the data
  • Worst case, nuke all data

Privacy

  • Introduction
  • Silence spam callers
  • Change your search engine

Malware

  • Introduction
  • Install a third party scanner
  • Scan and clean machine
  • Analysing trojans

Operations security

  • Introduction
  • Don’t get juice-jacked
  • Do not auto-join Wi-Fi networks
  • Use email securely
  • Detecting fake emails and phishing
  • Browse more safely
  • Measure Internet Censorship
  • ‘;–have i been pwned?

Guards! Guards!

  • Introduction
  • Lockdown Privacy
Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds