How to Use an iPod Touch as a Secure Device Instead of a Phone

SIM-jacking. Warrantless access to location data. SS7 interception. The threats against devices on traditional mobile phone networks are varied and serious. But what if there was a way to largely avoid these issues while maintaining some degree of connectivity with friends and colleagues, all on a pretty secure device?

There is. It’s using an iPod touch, which only works over Wi-Fi, and here’s how you can set one up as your phone substitute.

At the end, you’ll be able to send messages securely through apps such as Signal, protect your traffic with your own VPN, and, if you like, make calls to normal phones over the internet as well.

Read full news article on motherboard.vice.com

 


Date:

Categorie(s):