This topic contains 1 reply, has 2 voices, and was last updated by AdministrativeWin514 3 weeks, 3 days ago.
- April 16, 2021 at 2:24 pm #383867
Currently learning about cyber security, recently just got the hang of closing my PC’s ports to plug ‘holes’ or vectors. But is there a way to do this for a smartphone (in my case android)? I ask simply because I do not have a good knowledge base of android architecture.
- April 16, 2021 at 2:24 pm #383870
i do know that phones when completely off will encrypt all data inside of them. so if you just press the off button all of your data is stored raw and can be easily stolen, the best idea is to press the off button for 5 second and like that keep you data secure. Its a simple yet important thing to know.
- April 16, 2021 at 2:24 pm #383868
Cell phones are behind cgnat (usually) so you’re at much less risk of someone connecting to your phone like they could a computer. Which, is actually not that likely either these days because most people run a router in their house so your computers are natted as well. But, I digress…
The biggest threats from the spy device in your pocket are:
1. Malicious apps. Because it’s near impossible for a threat actor to access your phone directly, the main way to get at you is to get you to deploy a malicious app for them which gives them access to your phone. Only download apps from trusted sources and even then be aware that malicious apps are routinely found in all the app stores despite their curators best efforts. Also, for Android, there’s an app called Vigilante which let’s you know when your camera and microphone are in use. If that alert comes up when you’re not expecting it, that’s an indicator of compromise.
2. Companies and governments “legitimately” spying on you. You can mitigate this a bit by being manic about the permissions you grant your apps. Location, files, and camera are the big ones bad guys want. Carefully decide what apps you REALLY need, and then neuter them as much as possible by only giving them the bare minimum access they ask for.
3. You can go one step further for some phones and get camera covers and microphone plugs. The availability of those is based on what’s available for your model of phone so it’s a bit of a hit and miss. There’s an online company that sells a wide range of these things but the name escapes me right now.
- April 16, 2021 at 2:24 pm #383869
Whatever you do on the surface, you should be aware that the [Baseband processors](https://en.wikipedia.org/wiki/Baseband_processor) in mobile phones are usually closed-source and proprietary (see [here](https://en.wikipedia.org/wiki/List_of_open-source_mobile_phones#Scope_of_the_list)). That means that there *might* be a “hole” in your phone buried so deep that you cannot “plug” it, and I say *might* because this is the big unknown.
If you want to be on the safe side you should consider all mobile technology as inherently insecure until there is a free and open baseband processor.
You must be logged in to reply to this topic.