If participants are already familiar with GPG encryption, introduce them to the K-9 email client and to APG. Discuss the pros and cons of using GPG on a mobile device (especially the risk of keeping a private GPG key stored on a smartphone versus the unique vulnerabilities of mobile devices) – the idea here is to reinforce that these decisions can vary from one context to another; participants will need to decide on their own whether the pros of using GPG on a mobile device outweigh the cons.
Optional: Give participants time to install and practice using K9 and APG during this session - they may want to try using the new keypairs that they create as they get familiar with the tool.
Ask participants - How much information do our phones know about us? Phones are a medium for many of our conversations, and thus have access to most if not all their contents; likewise, phones also keep track of not just content but also contacts – every conversation can be connected to specific individuals.
You may also want to discuss with participants how the kind of tracking a phone performs could be considered a form of surveillance, and how surveillance can take place through more than just the usual, anticipated methods. Ask the group about what kinds of threats or risks they feel might be posed by their mobile devices, specifically in the context of their work as WHRDs.