CommsBlack Mobile

Threat Assessment

Answer 22 quick questions to generate your personalised Threat Profile and see whether Shield, Shadow, or Ghost fits your situation.

Progress 0%

1. Are you facing any adversary who is intentionally trying to identify, monitor, or obtain your communications?

2. Who do you believe your adversary could be? Select all that apply

3. Do you believe you are being targeted right now?

4. Your communications are protected, but advanced adversaries can still exploit where and when your device connects.
Would it cause issues if someone knew your device connected at a protest, workplace, or other sensitive location?

5. If your location during device use was exposed, what would the consequence be?

6. What is your main privacy/security goal for this device?

7. How will you use this device?

8. Do you work in an area that increases your privacy/security risk?

9. Which assets matter most to protect? Select all that apply

10. What would the impact be if these assets were exposed?

11. Do you store or handle sensitive information that could interest an adversary?

12. How do you usually connect to the internet?

13. Which of these behaviours apply to you? Select all that apply

14. Does anyone else have access to your devices, even briefly?

15. How would you rate your technical skill level?

16. How confident are you in following OPSEC (operational security) steps if needed?

17. Do you need reliable voice calling from this device?

18. Do you need SMS capability?

19. Are you comfortable using VoIP apps (with or without KYC)?

20. How structured is your daily routine?

21. Are you willing to follow simple OPSEC steps (e.g., keeping devices separate, short connection sessions)?

22. Would you tolerate commsite-style usage (short, deliberate sessions) if your situation required it?