Breaking Free: DeGoogling, DeAppling, and Protecting Your Digital Self at Protests
So, you’ve decided to stand up and protest against the fascists. You feel safe(ish) in the crowd, but your phone is doing more work than you think and you need to understand how to protect yourself and others.
- It’s logging your exact location.
- Every photo/video carries a timestamp, GPS data and sometimes a unique identifier.
- And above you, a van parked on the street is likely running an IMSI catcher, a device that pretends to be a cell tower, tricking every phone nearby into connecting to it instead of an actual cell tower.
- Once connected, police can gather your phone’s unique identifiers (IMSI, IMEI), link you to everyone you contact, and even map who is at the entire protest in minutes.
That’s why privacy isn’t an abstract idea here, it’s survival. Or as security experts often say:
“Your phone is the primary surveillance device in your pocket.”
This post is the first in a multi-part series on how to stay as invisible as possible when you protest. There are bonus benefits too, the same steps also cuts you free from the marketing machines of Google, Apple, Meta, and their peers.
This series isn't about the specific skills you need when engaged in an aggressive protest. Additionally this isn't about what to do if you spot I.C.E. in your neighborhood.
This series is more about protecting your digital identity which happens to coincide with degoogle'd and deapple'd devices.
I’ll be releasing each article for free. Please feel free to share them widely with friends, family, and organizers so more people have the tools to resist fascists. I encourage you to subscribe so you know when I have finished the next article. Found another good resource? Please share with me so I can provide out a list of links.
Part One: Why Protesters Need to Break Free from Big Tech
- Risks at protests:
- Phones log your location constantly.
- Photos/videos carry metadata (timestamps, GPS).
- Cloud sync means police/government can subpoena your data.
- Quote: “Your phone is the primary surveillance device in your pocket.”
- Case examples:
- Police using Google location history warrants (“geofence warrants”).
- iCloud backups used in court.
Part two: How to get started: Controlling Your Phone’s OS and Settings
- Why stock OS is risky: Apple & Google both cooperate with law enforcement data requests.
- Safer alternatives:
- GrapheneOS (strong security).
- /e/OS or LineageOS (less Google).
- Practical interim steps if you can’t flash a new OS yet:
- Turn off biometric unlocks (force PIN/passphrase).
- Disable cloud backups.
- Or better yet, host your own sync solution
- Airplane mode or burner phone for protests.
- Realistic tip: “Don’t expect to be James Bond. Sometimes the safest move is leaving your primary phone at home.”
Part three: How to replace the convenience of Google/Apple services: Breaking the Account Leash
- Why it matters:
- Accounts are single points of failure.
- iCloud and Google Drive backups can be accessed without your consent.
- What to do instead:
- Use Proton Mail, Tutanota, or other secure services.
- Keep protest comms separate from your main identity.
- Protester tip: Consider using a dedicated SIM + email for organizing to reduce cross-linking of your identities.
Part four: Safe communication methods: Safer Apps for Protest Communication
- Messaging:
- Use Signal, Element or Session (end-to-end encrypted).
- Avoid SMS, iMessage, RCS, or WhatsApp for sensitive organizing.
- Maps:
- Offline-first apps (Organic Maps, OsmAnd) reduce data trails.
- Photos/Videos:
- Use ObscuraCam or strip metadata before sharing.
- Tip: “Assume anything uploaded to the cloud can be traced back to you.”
Part five: Traps: Escaping the Ecosystem Traps (Protest Edition)
- Payments:
- Apple Pay/Google Pay tie purchases to your identity. Use cash or prepaid cards for supplies.
- Smart devices:
- Don’t bring smartwatches or linked wearables — they leak location.
- Storage:
- Don’t rely on Google Photos or iCloud for protest photos. Use encrypted local storage instead.
Part six: All about breaking the habits: Habits, Hardware, and Staying Realistic
- Habits:
- Break the instinct to check in, tag locations, or search through Google at protests.
- Hardware:
- Burner phones with prepaid SIMs can be safer for protest days.
- Open hardware (Fairphone, PinePhone) for long-term resilience.
- Mindset:
- “This isn’t about hiding from the world. It’s about limiting unnecessary exposure.”
- Decide your own risk tolerance and adopt steps accordingly.
A final summary article will talk about:
- Emphasize Iteration: Nobody needs to do everything at once. Even small steps reduce risk.
- Quote: “Freedom comes one step at a time — and safety is built by making realistic choices, not movie-script fantasies.”
- Invite reflection: Think about your personal threat model (what are you actually worried about? Police? Employers? Doxxing? Getting Disappeared?).