This post discusses four personas, the technical threats to them and their information via their smartphone, and some theory on how to defend against an increasingly capable and focused threat actors. If you find yourself matching one of these personas, following the recommendations below may serve you well if you…