Some people think its a conspiracy, some swear its the truth. But the question remains... is your phone, a spy?
Welcome to another #TechTuesday.

*@Dre_AFC suggested this week's topic.
(THREAD):
(1/16) For at least the past 10 years. Phones have had an increasing part of our computing lives. The more we use them, the more powerful they become.

AND as a consequence, criminals target phones to gather secret information about you. Here's some info... #TechTuesday
(2/16) There’s up to 7 "main" radios in your phone:

1. GSM for calls
2. 3G and LTE (or 4G) for internet
3. WLAN for WiFi
4. Bluetooth for accessories
5. NFC for pairing and payments
6. GPS
7. 5G for faster Internet

All of them can be used to track you. #TechTuesday
(3/16) The reason radios are significant is ‘cause this is how phones can potentially communicate with other tech/electronics.

In what feels like a long time ago, we used to be able to pull out a phone’s battery. Today, we can’t – so don’t assume it’s truly off #TechTuesday
(4/15) GSM enables mobile calls in most of the world. A phone sends voice and data signals to the nearest tower it can “shake hands” with. This handshake is logged, and since a number is locked to a SIM card and a SIM card is locked to a person – you can be tracked. #TechTuesday
(5/16) For context, RICA was introduced so that “suspects can be tracked” on where they have been by forcing mobile operators (eg. MTN) to provide logs of where their phone (aka them) have been – based on phone tower logs. Remember Brian Molefe and Saxonwold shebeen? #TechTuesday
(6/16) Separately, 3G/4G use radios that can send large amounts of data packets with little power usage (all things considered).

5G takes this further but increasing speed, increasing the range, and using less power.

Consider: we can’t pull out a phone’s battery #TechTuesday
(7/16) In comes software…

Operating systems and apps are notorious for collecting data. All those screens that want you to confirm/agree/allow when you’re switching your phone on for the first time? – they’re also asking for your permission to collect info on you. #TechTiesday
(8/16) For example – “Location Services” allows your phone to on/off its GPS silently at any time. This can be used in conjunction with built-in apps and often presented with “best intentions”, e.g. a Lost Phone service, Weather forecast for wherever you are, etc. #TechTuesday
(9/16) I still haven’t explained how this leads to spying 🙈

Okay…
We’ve established that your phone has several radios in it. These radio’s work both interdependently and independently of one another. E.g. you don’t need to have your Bluetooth on for Wifi to work. #TechTuesday
(10/16) But radios are just hardware. Spying happens (mostly) at the software level.

Apps makes use of the hardware to execute their functions and features. Your phone’s camera app is a basic example – it requires access to the camera, and the GPS to add location. #TechTuesday
(11/16) …this is understandable and that’s just a camera. But imagine an app that lets you send messages (4G / WiFi), take and post pictures (Camera), pay for stuff by tapping (NFC), check in to places (GPS), access your contacts list and trigger phone calls (GSM). #TechTuesday
(12/16) Now imagine that all of this is in one app, and this app requires you to have an account to use it.

Sounds familiar? – that’s basically most social networking apps and both major phone operating systems (iOS, Android). Nothing is sparred. #TechTuesday
(13/16) An app can identify you via your login, then use your phone’s GPS, then send location information about you and your activities – by using WiFi or 3G/4G/5G.

This doesn’t mean they do it, but they can. Just like a locksmith can make his own copy of YOUR keys #TechTuesday
(14/16) Using the locksmith as an example – we don’t tell the locksmith where we live right? But in your phone, you don’t have this choice. And like the saying goes – no one knows you more than your phone. (I’m looking at you gents). #TechTuesday
(15/16) Apple, Google, Samsung etc all promise to keep your information private on their phones and apps, but what about John Doe’s app you installed? For context, there has been calculator apps that have been found to scrape your address book for information. Imagine #TechTusday
(16/16) So while your device manufacturer may have “strict security measures” in place, apps you install send plenty information to their servers, which often get hacked. This is also why we can never stop spam – someone always has your email address / phone number. #TechTuseday
(16+1/16) I used a camera as an example, but also consider that apps can also trigger your microphone too. Fly-on-the-wall type stuff.

Its great having a smartphone that can do so much – but the cost of convenience will always be security #TechTuesday
Conclusion: There is no feasible solution. Your trust lies solely in whatever apps you install, whoever your phone manufacturer is, and whichever network you are on.

Side note: I use an iPhone, iPad, Windows, and macOS and no - I do not feel “safe” with any of them.
You can follow @KoketsoResane.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.