Should you bring your phone to a protest? This is a common dilemma for journalists, activists, and protesters alike. On the one hand, phones are a vital means of communication and information distribution; on the other, they can pose significant privacy and security risks.
In this guide, we’ll discuss the advantages and risks of bringing a phone to a protest and explain how you can protect your device and enhance your privacy and security.
What Are the Risks of Bringing Your Phone to a Protest?
Having a phone with you when attending a protest can be valuable, but it also carries risks. Below are potential risks to consider:
- Device loss or theft
- Confiscation
- Targeted surveillance
Device Loss or Theft
Protests often involve large crowds and chaos, and in such environments, the risk of losing or having your device stolen increases significantly. You may not even notice your device slipping out of your pocket or bag, and by the time you do, it may be too late to find it.
For most protestors, material damage isn’t the primary concern; it’s what someone could do with the information on the phone. If your device isn’t well-protected, the person who has it can access your emails, social media accounts, documents, messages, or the banking app, severely compromising your privacy and potentially exposing sensitive information.
Confiscation
If you’re detained or arrested during a protest, the authorities can take your device. The law states that they can’t search your phone without a warrant if you don’t consent. There are certain exceptions, such as:
- Preventing imminent harm or danger to life
- Pursuing a suspect
- Preventing the destruction of evidence
During protests, which can get chaotic, some police officers may not follow the legally defined procedures and search your phone anyway, despite not having your consent.
Note: Even if your device is confiscated and searched, authorities can’t use the content they find as evidence without a warrant as that would not stand in court.
Targeted Surveillance
Phones at protests present major privacy risks as malicious actors or authorities can:
- Use IMSI catchers to intercept traffic and track location data
- Monitor unencrypted traffic
- Disrupt service
- Monitor calls and texts
- Deploy malware or spyware
The long-term consequences of these actions could involve exposure of personal or sensitive information, ongoing surveillance, and severe financial loss.
Did you know? Protesters are often concerned about their phones being tapped without their knowledge. The truth is, authorities can tap your device regardless of your location, but to do it, they need a warrant, and obtaining one involves a complex procedure. This type of targeted surveillance is severely controlled and strictly regulated to prevent abuse.
Why You Should Consider Bringing Your Phone to a Protest
Considering the implications of taking your phone to a protest, it may seem that the best option is to leave it at home. Many protesters decide to take their phones with them due to several important reasons, including:
Purpose | Explanation |
Communicating with others | Without your phone, you won’t be able to reach out to your loved ones in case of an emergency or communicate with other protesters for coordination. |
Sharing content on social media | By leaving your phone at home, you won’t be able to document the protest and the important events you’re witnessing, limiting your ability to contribute to public awareness. |
Navigating the protest | Without your phone, you may have trouble finding meeting points or safe routes or locating your group if you get separated. |
How To Protect Your Phone During a Protest: 7 Best Practices
If you decide to take your phone to a protest, there are several steps you can take to protect your device’s security and privacy and minimize the risk of unauthorized access, surveillance, and data breaches. Below are valuable tips and best practices for keeping your phone safe during protests and other mass gatherings:
- Encrypt data
- Use encrypted apps for communication
- Hide your notifications
- Turn off location
- Use Airplane mode
- Place your device in a Faraday bag
- Use a reliable mobile carrier
1. Encrypt Data
If your device gets lost or stolen, data encryption can save the day and ensure nobody can access the information stored on your phone. Encryption scrambles your data into code only you can unlock and read.
iPhones and modern Androids (version 10 and higher) offer encryption by default, but only if you lock the device with a passcode or biometric authentication. The latter isn’t recommended for protests as authorities or malicious individuals could use biometrics to forcibly unlock your device and access the information it contains.
It’s best to set up a unique PIN. Avoid easy-to-guess passcodes such as “1234” or “0000.” Instead, use longer, unique combinations of random numbers to protect your device and encrypt data on it.
If you own an older Android device, you can manually enable encryption. Check your device’s encryption status in Settings and select your preferred options.
Tip: To protect your device from network-level threats, pair device-level encryption with a secure, privacy-first mobile carrier such as Cape.
2. Use Encrypted Apps for Communication
As attending protests carries a higher risk of message interception, you should be mindful of the apps you’re using to communicate with other protestors or your loved ones. Apps that offer end-to-end encryption (E2EE) protect your communications from interception and unauthorized access, ensuring that only you (the sender) and the recipient can read the content of the messages.
Such apps are:
- Signal
- Telegram (for Secret Chats)
- iMessage (for communication between iOS devices)
3. Hide Your Notifications
If your device gets stolen or confiscated and you have a strong password, the person who has it won’t be able to access the information on it, but they could read the notifications on your lock screen. Besides exposing sensitive information, screen notifications could reveal the identity of the people you’re communicating with, jeopardizing their privacy.
Even if your device is in your possession, people around you may be able to see your screen notifications and read potentially confidential information. To prevent this, you should hide your lock screen notifications, and the process takes only a few steps regardless of your OS.
If you’re an Android user, follow the steps below to hide your screen notifications:
- Open the menu and go to Settings
- Tap Notifications
- Choose Lock screen notifications
- Switch the toggle button at the top to completely disable lock screen notifications. You can also customize notification styles and choose whether to display content for specific apps
iPhone users should follow these steps to hide their screen notifications:
- Launch Settings and tap Notifications
- Choose Show previews
- Select Never or When Unlocked to ensure notifications don’t appear on the lock screen. Alternatively, you can customize screen alerts for each app individually
Did you know? The law protects you from unreasonable seizures and searches, so authorities can’t get into your phone without a passcode and can’t force you to unlock the device, especially not without a warrant.
4. Turn Off Location
With location services enabled on your device, authorities and malicious actors could track your whereabouts and potentially tie you to a specific event solely based on your proximity to it. Additionally, your location could be combined with other data points to create a record of you, and malicious actors could leverage this to launch cyberattacks in the future.
Disabling location services enhances your privacy and security, preventing others from tracking your movements. Here’s how Android users can turn off location on their devices:
- Go to Settings
- Scroll down and tap Location
- Switch the toggle button at the top of the screen to disable location tracking. Here, you can also review apps with permission to access your device’s location and customize settings
If you use an iPhone, here’s how to disable location services:
- Open Settings
- Choose Privacy & Security
- Tap Location services
- Switch the toggle button off to disable location services completely or manage location permissions for individual apps
Tip: Cape offers built-in protection against location tracking thanks to its security-first network that shields from the most advanced tracking and surveillance methods.
5. Use Airplane Mode
Airplane mode automatically disables all cellular, Wi-Fi, and Bluetooth signals, ensuring nobody can track them for surveillance purposes. The downside is that while airplane mode is enabled, you can’t send regular text messages or make calls; you can connect to Wi-Fi networks, but this isn’t recommended because these networks can be monitored.
Enabling airplane mode during protests makes sense if you know you won’t be communicating with anyone for a specific amount of time, but want to have your phone with you to take photos or videos. Since disabling it takes only a few seconds, you can be back online in no time and communicate with others if necessary.
Enabling airplane mode looks the same on Androids and iPhones:
- Swipe down from the top-right corner of your screen to open the notification panel
- Tap the airplane icon
6. Place Your Device in a Faraday Bag
Faraday bags block all electromagnetic signals from being sent and received, including:
- Wi-Fi
- Cellular signals
- Bluetooth
- NFC and RFID signals
- GPS
These pouches create a shield around your device, ensuring nobody can access your phone or track its location. While offering powerful protection, Faraday bags also disable communication, so you won’t be able to exchange calls and messages with others while your phone is in the pouch.
While they’re efficient, don’t forget that Faraday bags offer only partial protection. As soon as you remove the device from the bag, protection ends, and your phone becomes exposed to potential surveillance, tracking, and cyberattacks.
7. Use a Reliable Mobile Carrier
Your mobile carrier should offer protection from network-level threats involving data interception, breaches, and tracking, not just during protests, but at all times. A privacy-first carrier, such as Cape, provides new levels of protection by:
- Collecting minimal amounts of data to reduce the risk of breaches and leaks
- Using innovative infrastructure that isn’t built on trust
- Offering advanced options to defend against IMSI catchers, signal interception, and tracking
- Relying on strong encryption protocols to keep sensitive information secure
Besides minimal data collection, Cape has strict data storage and sharing policies, ensuring that your information remains private and minimizing security risks.
How Cape Makes Privacy Accessible for Everyday Users
Our phones carry our most personal information, yet the networks we rely on often treat that data carelessly: collecting too much, sharing too freely, and leaving users exposed to breaches, SIM swaps, and surveillance.
Cape breaks this cycle. We’re a privacy-first carrier that delivers everything you’d expect for cell service, including unlimited calls, texts, fast 4G/5G, and reliable nationwide coverage, without the trade-offs of traditional providers. Our network is built to minimize data collection and defend against the threats baked into legacy telecom systems.
Protection | How It Works |
Cape runs its own software-based network, giving us direct control over how data moves and enabling stronger, modern security protocols. | |
Accounts are secured with a 24-word recovery phrase that never leaves your device. Not even Cape can transfer your number without it, shutting down one of the industry’s most common attack methods. | |
Our proprietary signaling proxy scans network requests in real time, blocking attempts to track your location or intercept calls and texts. | |
We don’t ask for names or addresses. Payments are tokenized by Stripe and stored separately from your account, so financial details can’t be linked back to you. | |
Both voicemail content and metadata are encrypted, with your private key (that only lives on your device) required to access them. | |
Cape collects only the bare minimum necessary to provide service. We don’t require identifying information like your name, Social Security number, or address. |
Transparency for Government Requests
As a mobile carrier, Cape is legally required to comply with lawful government requests. However, because we retain minimal data, we can only provide what we have. Additionally, we will notify subscribers of receipt of legal process seeking disclosures related to their accounts whenever possible, and will challenge overly broad demands. You can read more about how we handle government requests in our Privacy Policy.
Cape also has a program offering free cell service to journalists and activists, or any high-risk individuals contributing to a free society. The Electronic Frontier Foundation (EFF) is an independent partner to this program to help vet applicants and get secure Cape service into the hands of those who need it most. Learn more about the program here.
Get the Cape Advantage Now!
Cape puts you in control of your data for $99/month. The plan includes unlimited calls, texts, and high-speed data, with no hidden fees or surprise charges. All you need is an eSIM-compatible device to get started.
Go to cape.co/get-cape to make the switch today.
Extend privacy beyond the network with our Cape x Proton partnership—subscribers get Proton Unlimited or Proton VPN Plus for just $1 for six months.

