laitimes

Is your phone really "bugged"?

author:Ping An Jilin

Nowadays, smartphones are an indispensable and important tool for people's daily life and work, carrying a variety of functions such as communication, information, entertainment, payment, etc., such as buying tickets, calling a car, navigation, etc., and our dependence on mobile phones can be imagined. However, while mobile phones have brought us various dividends, we have also begun to worry more and more about the security of our personal information.

Is your phone really "bugged"?

Many netizens have had similar experiences, when you are discussing some specific topics with your friends, such as travel, shopping wish lists, and a certain brand, your phone will quickly pop up many ads about these topics. Is this a coincidence or something else? Is it really "bugged" on mobile phones?

In reality, these are just algorithmic and analytic ad delivery methods. According to CCTV, the reporter specifically investigated the suspected "surveillance" of mobile phones and confirmed that "the possibility of App monitoring is almost non-existent".

He Yanzhe, deputy director of the Evaluation Laboratory of the Cyber Security Research Center of the China Electronics Standardization Institute, pointed out in the report that although mobile phone "eavesdropping" is technically feasible, it will lead to a very high energy consumption ratio, and it will also require high costs and huge legal risks.

He Yanzhe said that first of all, this kind of data collection behavior is limited, because it involves the privacy and data protection of users. Mobile phone manufacturers and app developers need to comply with relevant laws and regulations to protect users' personal information from being misused or leaked.

Secondly, in the process of using mobile phones, we must always have a vigilant heart and maintain the vigilance of "there must be demons when things go wrong". Once your phone has the following two phenomena, you need to pay attention:

1. Mobile phone traffic has increased significantly. If the mobile phone data consumption has increased significantly, and you have not changed your habits, such as frequently downloading large files or watching high-definition videos, then you need to be vigilant about mobile phone users.

2. The power consumption of the mobile phone has increased significantly. If the battery consumption of the mobile phone increases significantly in the standby state, and you do not perform any operations, it may be caused by the unscrupulous APP listening on the mobile phone. Because the energy consumption of eavesdropping is very large, if a single app wants to monitor uninterruptedly, it will consume at least 6% of the power in an hour, and if there are five or six apps monitoring at the same time, the power will be lost by more than 30% in an hour.

Although it is not excluded that there are individual unscrupulous APPs that "monitor" mobile phones, at present, it is almost impossible for the mobile phones we use to have the phenomenon of "monitoring", and Liu Peng, a big data expert, gave an analysis from five aspects:

1. Red dot prompt in the status bar of the mobile phone: Once the APP calls sensitive permissions such as "microphone" and "camera", a permanent icon or red dot prompt will appear in the status bar, and it is impossible to "eavesdrop" without the user's sense. And by clicking on the prompt, you can see at a glance what the name of the app is calling the permission.

Is your phone really "bugged"?
Is your phone really "bugged"?

For example, a map software that we often use can clearly see that there is a prominent sign for calling the microphone permission with the user's permission.

2. High energy consumption, the mobile phone is not enough to support: the behavior of "monitoring" has extremely high requirements for the operation of the mobile phone system, which will quickly consume the power and traffic of the user's mobile phone, which will cause the mobile phone to heat up and freeze, and the power, memory and traffic of the mobile phone cannot be supported.

3. Restrictions on the operating system: The new version of the mobile phone operating system will prevent the APP from recording silently in the background for a long time, and the maximum time to obtain microphone permission is 1 minute.

4. High cost and low efficiency: If the APP is "eavesdropping", it not only requires extremely high storage and computing costs, but also has low efficiency, large noise, and extremely slow processing speed, which is obviously not in line with business logic.

5. High legal risk: According to the Criminal Law of the People's Republic of China, the Civil Code of the People's Republic of China and other laws and regulations, eavesdropping is an illegal act, and there is no need for regular enterprises to take huge legal risks to "eavesdropping".

Of course, if you want to better protect your privacy and prevent sensitive permissions such as microphones from being inappropriately invoked, then there are actually settings in the mobile phone system:

Open → "Settings" → "Privacy" → "Permissions Management" in your phone

Is your phone really "bugged"?
Is your phone really "bugged"?
Is your phone really "bugged"?

On this page, you can see all the permissions on your smartphone, such as location, microphone, camera, contacts, etc.

Is your phone really "bugged"?

Set permissions on your own and remove unnecessary authorizations. For example, some apps need access to your microphone, but if you don't need to use voice features in the app, you can remove the app's microphone permission. If you need to use it, you can set it to allow it only during the use period.

Is your phone really "bugged"?

With the development of science and technology, there will be more and more electronic products like mobile phones around us, and the functions will become more and more powerful. Although precise push often gives everyone the feeling that our mobile phones have been "tapped", in fact, there is no need for merchants and APP developers to use such a risky, complex and unusually expensive means of "eavesdropping" to keep an eye on someone's shopping needs. So, when we receive an ad that "happens" to be similar to our own chats and browsing, don't worry too much and just look at it rationally.

What do you think about this?

Let's talk in the comment section

Source: Rule of Law Network

Read on