5 Steps to Secure Your Smartphone

Your phone is a tracking device. Here are 5 non-negotiable steps from Forrest Garvin to harden your mobile security and take back your privacy.

Forrest Garvin May 15, 2026 2 min read
5 Steps to Secure Your Smartphone

Title: 5 Steps to Secure Your Smartphone

Excerpt: Your phone is a tracking device. Here are 5 non-negotiable steps from Forrest Garvin to harden your mobile security and take back your privacy.

Content:

Privacy · Security · Independence

5 Steps to Secure Your Smartphone

Smartphone security hero image

Your smartphone is the greatest surveillance device ever invented. It tracks your location, listens to your conversations, and logs your every move. If you are not taking active steps to secure it, you are handing over the keys to your private life.

I am Forrest Garvin. I have spent over 20 years helping individuals protect their data. At Garvin Academy, we do not do theory. We do practical, real-world action.

Follow these five steps to harden your device.

Step 1: Switch to GrapheneOS or a de-googled phone

If you are running standard Android or iOS, you are being tracked by Google or Apple. The operating system itself is the problem.

Your action plan:

Invest in a Google Pixel and flash it with GrapheneOS. It removes Google Play Services and provides a hardened kernel. If you cannot do that, use an iPhone but disable all iCloud services.

Step 2: Use physical kill switches & Faraday bags

Software security is not enough. You need physical layers. When you are not using your phone, it should not be able to communicate with the outside world.

Your action plan:

Use a high-quality Faraday bag for transportation. For communications, consider devices with physical kill switches for the microphone and camera.

Step 3: Eliminate biometrics

Face ID and fingerprint sensors are convenience tools, not security tools. In many jurisdictions, authorities can legally compel you to unlock your phone with your face or finger. They cannot compel you to provide a passcode.

The Garvin standard:

  1. Disable Face ID and Touch ID.
  2. Use a minimum 10-character alphanumeric passcode.
  3. Set the device to wipe after 10 failed attempts.

Step 4: Route all traffic through Orbot (Tor)

A VPN is a start, but it is a single point of failure. To truly mask your activity, you need the Tor network.

Your action plan:

Install Orbot. Configure your apps to route through the Tor proxy. This hides your IP address from both your service provider and the sites you visit.

Step 5: Audit and isolate apps

Every app on your phone is a potential vulnerability. Many apps harvest data in the background even when not in use.

Your action plan:

  1. Delete every app you do not absolutely need.
  2. For the remaining apps, use the sandboxing features in GrapheneOS to prevent them from accessing your contacts or files.
  3. Only use Signal for messaging.

Take back control

Securing your phone is the first step toward digital independence. At Garvin Academy, we teach you how to protect yourself in an increasingly fragile world.

View our privacy courses here

Buy the book: Lock It Down here

Stop being the product. Start being the owner of your data.

Tags#Smartphone Security#Digital Privacy#GrapheneOS#Faraday Bags#Forrest Garvin
ShareXFacebookLinkedIn