5 Steps to Secure Your Smartphone
Your phone is a tracking device. Here are 5 non-negotiable steps from Forrest Garvin to harden your mobile security and take back your privacy.

Title: 5 Steps to Secure Your Smartphone
Excerpt: Your phone is a tracking device. Here are 5 non-negotiable steps from Forrest Garvin to harden your mobile security and take back your privacy.
Content:
Privacy · Security · Independence
5 Steps to Secure Your Smartphone

Your smartphone is the greatest surveillance device ever invented. It tracks your location, listens to your conversations, and logs your every move. If you are not taking active steps to secure it, you are handing over the keys to your private life.
I am Forrest Garvin. I have spent over 20 years helping individuals protect their data. At Garvin Academy, we do not do theory. We do practical, real-world action.
Follow these five steps to harden your device.
Step 1: Switch to GrapheneOS or a de-googled phone
If you are running standard Android or iOS, you are being tracked by Google or Apple. The operating system itself is the problem.
Your action plan:
Invest in a Google Pixel and flash it with GrapheneOS. It removes Google Play Services and provides a hardened kernel. If you cannot do that, use an iPhone but disable all iCloud services.
Step 2: Use physical kill switches & Faraday bags
Software security is not enough. You need physical layers. When you are not using your phone, it should not be able to communicate with the outside world.
Your action plan:
Use a high-quality Faraday bag for transportation. For communications, consider devices with physical kill switches for the microphone and camera.
Step 3: Eliminate biometrics
Face ID and fingerprint sensors are convenience tools, not security tools. In many jurisdictions, authorities can legally compel you to unlock your phone with your face or finger. They cannot compel you to provide a passcode.
The Garvin standard:
- Disable Face ID and Touch ID.
- Use a minimum 10-character alphanumeric passcode.
- Set the device to wipe after 10 failed attempts.
Step 4: Route all traffic through Orbot (Tor)
A VPN is a start, but it is a single point of failure. To truly mask your activity, you need the Tor network.
Your action plan:
Install Orbot. Configure your apps to route through the Tor proxy. This hides your IP address from both your service provider and the sites you visit.
Step 5: Audit and isolate apps
Every app on your phone is a potential vulnerability. Many apps harvest data in the background even when not in use.
Your action plan:
- Delete every app you do not absolutely need.
- For the remaining apps, use the sandboxing features in GrapheneOS to prevent them from accessing your contacts or files.
- Only use Signal for messaging.
Take back control
Securing your phone is the first step toward digital independence. At Garvin Academy, we teach you how to protect yourself in an increasingly fragile world.
Buy the book: Lock It Down here
Stop being the product. Start being the owner of your data.

