Your mobile phone is watching you

Модератор: zlata

Your mobile phone is watching you

Сообщение HainanWel.com(e)! » 19 мар 2016, 13:26

resulting from the use of a mobile phone can be divided into two blocks. First - it is possible to track the location of your phone, and the second - the possibility of access to information on the phone. Turning on the machine continuously communicates with the base stations of the operator, which allows you to track a certain accuracy of its location. Communication with stations provided mainly through working sim card operator. The operator is also fixed number of the device in which the card is inserted.

Myth: shadowing can be avoided by buying a gray and left a SIM card.

Reality: Gray and left "Sims" I would not recommend to use, since it is impossible to know in advance that this "sim card" is already there. Behind it can reach the criminal trail that will lead you to the law enforcement agencies, regardless of your activity.

Myth: If the SIM card is decorated on the other person, it is impossible to keep track of who it actually uses.

Reality: billing data allows mobile device correlated to a specific address. If you are under the supervision and live permanently at the same address, then your number is permanently recorded on the same base station. It is obvious that you associate with this device it is possible, even if the contract is for the other person. If you have decided for security reasons to change the phone number and insert a new SIM card in the same apparatus, which used to be the SIM card issued to you, it does not matter to whom you have contracted: to establish a direct connection between your device and a new number It will not be difficult, since the mobile operators in addition to sIM card also registers and device IMEI.

Myth: Saves the purchase of a new phone with simultaneous replacement of your SIM card to the card issued to another person.

Reality: If you stop to use the old equipment and all their de-energized, changed residential address and so on, it will help, but temporarily. The essence of the phone - it is, first and foremost, communication, therefore safety is provided to you prior to the first call from a person of your circle of friends, and then the chain can reach you.

Myth: There is a guaranteed way to protect against spying on phone location.

Reality: You have to understand that the phone - one of the most unsafe devices. Even if you buy clothes with special pockets made of a material that absorbs the mobile signal, it is not foolproof. The only way, which ensures that you do not keep track of the location of the phone - the rejection of its use and storage.

Myth: Protected messengers do not allow outsiders to intercept the information.

Reality: When exchanging messages, they will be available in at least two places on your device and on the device of your interlocutor. He must follow, at least, the same security as you. For example, you are using a secret chat, but it makes for some screenshots and stores messages on your phone. This fully obessmyslivaet use of secret chat rooms, if someone gains access to his device.

8 Safety Tips

1. Do not leave your phone unattended, so that third parties are not able to access it, download information from it, or insert a memory card or SIM card with a program that will follow you.

2. The phone must have a complex password for access to information.

3. Do not use your phone as a repository of information, as there is always a risk that it will have access to third parties.

4. Do not give sensitive information on ordinary mobile communication channels.

5. Use secure Messager, which have the function of secret chat with the possibility of storing messages in the phone time, after which they are removed. For calls using applications such as Signal, which encrypts voice and text traffic on both sides.

6. Use encryption. If iOS automatically encrypts the information in the Android this function you need to activate additional security settings. The user will not notice it, but the information will be somewhat protected.

7. If you change the SIM card, make sure that the previous SIM card is destroyed, since it can also save the information.

8. Pre-configure capabilities remotely erase data from your phone. Users of iOS-based devices, as a rule, know the remote wipe procedure. Google also has provided such a possibility.
HainanWel.com(e)!
Администратор
 
Сообщений: 12286
Зарегистрирован: 01 июл 2010, 14:25

Вернуться в HIGHLIGHTS STORIES

Кто сейчас на форуме

Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 2