Hi everyone,
This is my first thread here. Wasn't sure where to post it...but I figured this was about right. Please let me know if I should have done otherwise.
Me and my wife have been getting badly hacked for some time. Suffice it to say that it's personal against us, not because we have done anything wrong, but rather because of taking a stand to do what is right.
Anyway...I have been learning and hardening up our computing but I just got hacked badly yet again a couple of days ago. Hackers changed my Google nickname, deleted hundreds of emails, and otherwise by commandeering my smartphone.
Here is what I am doing this time on some of our computing and what I would appreciate input on.
Two smartphones. The one has a phone and data plan. The other has none (I destroyed the SIM card on it a while back.
I am installing what I need on the smartphone (the one with the plan)through direct APK download and installation (to avoid entering Google credentials on what may still be a compromised phone). I factory data reset it.
The dumb phone (the one without any plan) will connect to the internet through the smartphones hotspot capabilities and will be using a VPN.
The smartphone will only be used to provide internet to the dumb phone.
The way I figure it, the hackers will only be able to hack and do whatever to my smartphone. Which is the only phone reachable over the internet connection.
The dumb phone cannot be reached directly through it's local IP address.
Is that correct?
Any suggestions or input would be greatly appreciated.
This is my first thread here. Wasn't sure where to post it...but I figured this was about right. Please let me know if I should have done otherwise.
Me and my wife have been getting badly hacked for some time. Suffice it to say that it's personal against us, not because we have done anything wrong, but rather because of taking a stand to do what is right.
Anyway...I have been learning and hardening up our computing but I just got hacked badly yet again a couple of days ago. Hackers changed my Google nickname, deleted hundreds of emails, and otherwise by commandeering my smartphone.
Here is what I am doing this time on some of our computing and what I would appreciate input on.
Two smartphones. The one has a phone and data plan. The other has none (I destroyed the SIM card on it a while back.
I am installing what I need on the smartphone (the one with the plan)through direct APK download and installation (to avoid entering Google credentials on what may still be a compromised phone). I factory data reset it.
The dumb phone (the one without any plan) will connect to the internet through the smartphones hotspot capabilities and will be using a VPN.
The smartphone will only be used to provide internet to the dumb phone.
The way I figure it, the hackers will only be able to hack and do whatever to my smartphone. Which is the only phone reachable over the internet connection.
The dumb phone cannot be reached directly through it's local IP address.
Is that correct?
Any suggestions or input would be greatly appreciated.