Contents
Computer and mobile forensics is a highly technical discipline aimed at identifying a compromise on a computer or phone. False negatives are common.
If you suspect that one of your devices has been compromised and you want to learn more about the suspected compromise, you could ask for help from the non-profit organization AccessNow[1], with the caveat that they are a legal organization that might be forced to share with the State data that you provide them.
See also:
- The Device Integrity[2] page on Privacy Guides.
- Practical Linux Forensics for a comprehensive introduction to the skill set on Linux, the platform most relevant to anarchists and other rebels.
Techniques addressed by this mitigation
Name | Description | |
---|---|---|
Targeted digital surveillance | ||
Malware | You can use computer and mobile forensics to detect traces of malware on a device on which malware is or was installed. | |
Physical access | You can use computer and mobile forensics to detect when a device has been physically accessed by an adversary. |