Accounts and authentication
Services and applications
Data
Privacy
Malware
Operations security
Guards! Guards!
Researching each app thorougly before installing
Application stores
Unwanted apps list
Removing unwanted apps
Browsers that protect your privacy
Changing default apps
Using more secure messaging services
Using more secure email services
Using SSH tunnels
Using VPN services
Using Tor proxies
Changing MAC address
Editing hosts file