Difference between revisions of "Smartphone"
(|description=A tool of mass surveillance) |
(→Mobile phone tracking: link) |
||
(5 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
|image_width=200px | |image_width=200px | ||
|description= | |description= | ||
− | |constitutes= | + | |constitutes=Telephone, Mobile phone, Computer, Communication technology |
|wikipedia_protection=1 | |wikipedia_protection=1 | ||
|interests= | |interests= | ||
Line 22: | Line 22: | ||
==Backdoors/Malware== | ==Backdoors/Malware== | ||
Smartphones remain very vulnerable to hacking attacks.<ref>https://medium.com/auedbaki/how-hackers-hack-phone-using-sms-89a5de67e776</ref><ref>https://www.wandera.com/is-my-phone-really-more-secure-than-my-computer/</ref><ref>https://www.mobileiron.com/en/company/press-room/press-releases/mobileiron-research-reveals-qr-codes-pose-significant-security-risks-to-enterprises-and-end-users</ref><ref>https://www.cnet.com/news/your-smartphones-are-getting-more-valuable-for-hackers/</ref> In addition, since at least [[2014]] reports surfaced about devices that were delivered with pre-installed [[malware]] in the firmware, a so called [[backdoor|hardware backdoor]].<ref>https://securelist.com/caution-malware-pre-installed/59356/ saved at [https://web.archive.org/web/20190216104214/https://securelist.com/caution-malware-pre-installed/59356/ Archive.org] saved at [http://archive.is/uO23M Archive.is]</ref><ref>https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf saved at [http://web.archive.org/web/20150905092446/https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf Archive.org]</ref> | Smartphones remain very vulnerable to hacking attacks.<ref>https://medium.com/auedbaki/how-hackers-hack-phone-using-sms-89a5de67e776</ref><ref>https://www.wandera.com/is-my-phone-really-more-secure-than-my-computer/</ref><ref>https://www.mobileiron.com/en/company/press-room/press-releases/mobileiron-research-reveals-qr-codes-pose-significant-security-risks-to-enterprises-and-end-users</ref><ref>https://www.cnet.com/news/your-smartphones-are-getting-more-valuable-for-hackers/</ref> In addition, since at least [[2014]] reports surfaced about devices that were delivered with pre-installed [[malware]] in the firmware, a so called [[backdoor|hardware backdoor]].<ref>https://securelist.com/caution-malware-pre-installed/59356/ saved at [https://web.archive.org/web/20190216104214/https://securelist.com/caution-malware-pre-installed/59356/ Archive.org] saved at [http://archive.is/uO23M Archive.is]</ref><ref>https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf saved at [http://web.archive.org/web/20150905092446/https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf Archive.org]</ref> | ||
+ | |||
+ | ==Mobile phone tracking== | ||
+ | {{FA|Mass surveillance}} | ||
+ | Tracking of smartphones is possible via a number of methods.<ref>https://en.wikipedia.org/wiki/Mobile_phone_tracking</ref> [[Big tech]] companies have a history of collecting location data of their customers/users secretly.<ref>http://web.archive.org/web/20150417071618/http://radar.oreilly.com/2011/04/apple-location-tracking.html</ref><ref>http://archive.today/2020.12.04-174303/https://www.wsj.com/articles/SB10001424052748703983704576277101723453610</ref> [[App]]s that collect location data have revelealed position of military service personnel <ref>https://www.wired.com/story/strava-heat-map-military-bases-fitness-trackers-privacy/</ref><ref>http://archive.today/2024.11.01-185522/https://xcancel.com/tobiaschneider/status/957317886112124928</ref> and supposedly even [[CIA]] [[black sites]].<ref>https://freethoughtblogs.com/stderr/2018/01/21/that-was-too-easy/</ref> | ||
==Increasing Internet use via Smartphone== | ==Increasing Internet use via Smartphone== | ||
− | Smartphones are about to replace [[Desktops]] (PC/Monitor) as the main way to use the [[Internet]],<ref>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/will-a-smartphone-replace-your-pc.html</ref><ref>https://www.wired.com/2015/02/smartphone-only-computer/</ref><ref>https://www.extremetech.com/computing/134868-there-can-only-be-one-smartphones-are-the-pcs-of-the-future</ref> while the usage of [[social media]] already happens mostly on smartphones.<ref>https://www.broadbandsearch.net/blog/mobile-desktop-internet-usage-statistics</ref><ref>https://techjury.net/blog/mobile-vs-desktop-usage/</ref> This has implications for how content from webpages must be presented to the viewer. The smaller screen does not allow for more complex information and graphical data at once (it has to be optimized for viewing on a smartphone), which likely leads to fewer views of webpages that do not offer another version optimized for mobile viewing and/or that present more text to read in general. | + | Smartphones are about to replace [[Desktops]] (PC/Monitor) as the main way to use the [[Internet]],<ref>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/will-a-smartphone-replace-your-pc.html</ref><ref>https://www.wired.com/2015/02/smartphone-only-computer/</ref><ref>https://www.extremetech.com/computing/134868-there-can-only-be-one-smartphones-are-the-pcs-of-the-future</ref> while the usage of [[social media]] already happens mostly on smartphones.<ref>https://www.broadbandsearch.net/blog/mobile-desktop-internet-usage-statistics</ref><ref>https://techjury.net/blog/mobile-vs-desktop-usage/</ref> This has implications for how content from webpages must be presented to the viewer. The smaller screen does not allow for more complex information and graphical data at once (it has to be optimized for viewing on a smartphone), which likely leads to fewer views of webpages that do not offer another version optimized for mobile viewing and/or that present more text to read in general. |
+ | |||
+ | ==Modular smartphone== | ||
+ | A modular smartphone allows to change, remove and/or manipulate single components.<ref>https://en.wikipedia.org/wiki/Modular_smartphone</ref> This allows for a phone that can be easily modified, to have no networking or battery, thus removing the possibility of covert tracking.<ref>How any cell phone can be tracked, censiCLICK, April 30, 2022 - https://www.youtube.com/watch?v=c1uOox8v73Y</ref><ref>Skynet 2024: The Infrastructure is Complete!, Rob Braxman Tech, April 17, 2024 - https://www.youtube.com/watch?v=9xPjIfJI5Jk</ref><ref>Google Created a New Device Tracking Network, Mental Outlaw, April 9, 2024 - https://www.youtube.com/watch?v=62Zp9DRIyNI</ref> Concepts that were promising, one by [[Google]], have been cancelled in the past.<ref>https://www.wired.com/story/google-cancels-project-ara/</ref> | ||
{{SMWDocs}} | {{SMWDocs}} |
Latest revision as of 18:44, 1 November 2024
Smartphone (Telephone, Mobile phone, Computer, Communication technology) | |
---|---|
A tool of mass surveillance |
A smartphone is a mobile device that combines cellular phone and mobile computing functions into one unit. They are distinguished from "feature phones" (ie Nokia 3210, 3310, Motorola C139, etc.) by their stronger hardware capabilities and extensive mobile operating systems, which facilitate wider software, internet and multimedia functionality.
Contents
Hardware
Smartphones, beside audio and video collection, contain a number of additional sensors that can be leveraged by their software (such as a magnetometer, proximity sensors, barometer, gyroscope, accelerometer, or GPS)
History
Early smartphones were marketed primarily towards the enterprise market, attempting to bridge the functionality of standalone personal digital assistant (PDA) devices with support for cellular telephony. The world's first smartphone was created by IBM in 1994, nicknamed "Simon". Shortcomings of the technology and connectivity did prevent proliferation of the technology at the time.
In the 2000s, several developed smartphone like the BlackBerry began to have traction. Following the rising popularity of the iPhone in the late 2000s, the absolute majority of smartphones now have copied the formfactor and usability from it. In the third quarter of 2012, one billion smartphones were in use worldwide.[1]
Backdoors/Malware
Smartphones remain very vulnerable to hacking attacks.[2][3][4][5] In addition, since at least 2014 reports surfaced about devices that were delivered with pre-installed malware in the firmware, a so called hardware backdoor.[6][7]
Mobile phone tracking
- Full article: Mass surveillance
- Full article: Mass surveillance
Tracking of smartphones is possible via a number of methods.[8] Big tech companies have a history of collecting location data of their customers/users secretly.[9][10] Apps that collect location data have revelealed position of military service personnel [11][12] and supposedly even CIA black sites.[13]
Increasing Internet use via Smartphone
Smartphones are about to replace Desktops (PC/Monitor) as the main way to use the Internet,[14][15][16] while the usage of social media already happens mostly on smartphones.[17][18] This has implications for how content from webpages must be presented to the viewer. The smaller screen does not allow for more complex information and graphical data at once (it has to be optimized for viewing on a smartphone), which likely leads to fewer views of webpages that do not offer another version optimized for mobile viewing and/or that present more text to read in general.
Modular smartphone
A modular smartphone allows to change, remove and/or manipulate single components.[19] This allows for a phone that can be easily modified, to have no networking or battery, thus removing the possibility of covert tracking.[20][21][22] Concepts that were promising, one by Google, have been cancelled in the past.[23]
Related Quotations
Page | Quote | Author | Date |
---|---|---|---|
Backdoor | “Every year, we learn about some issue in WhatsApp that puts everything on their users' devices at risk. Which means it's almost certain that a new security flaw already exists there. Such issues are hardly incidental – they are planted backdoors. If one backdoor is discovered and has to be removed, another one is added” | Pavel Durov | 5 October 2022 |
Mass surveillance | “Always keen to get the latest smartphone? Soon it won’t matter, said Mike Bechtel, Chief Futurist at Deloitte. “Over the next 10 years its going to be about moving beyond the device,” he said. “We can’t realistically have 15 smart speakers everywhere we go....We are going to be moving to ambient experiences, which is shorthand for a sort of digital Downton Abbey where we don’t ask Echo or Google ‘What’s the weather?’, we just say ‘What’s the weather?’ and the right agent jumps up at the right time to give the right answer.” | Mike Bechtel | 16 April 2021 |
Mobile phone | “A mobile phone is a tracking device that also makes calls” | Julian Assange |
References
- ↑ http://news.cnet.com/8301-1035_3-57534132-94/worldwide-smartphone-user-base-hits-1-billion/
- ↑ https://medium.com/auedbaki/how-hackers-hack-phone-using-sms-89a5de67e776
- ↑ https://www.wandera.com/is-my-phone-really-more-secure-than-my-computer/
- ↑ https://www.mobileiron.com/en/company/press-room/press-releases/mobileiron-research-reveals-qr-codes-pose-significant-security-risks-to-enterprises-and-end-users
- ↑ https://www.cnet.com/news/your-smartphones-are-getting-more-valuable-for-hackers/
- ↑ https://securelist.com/caution-malware-pre-installed/59356/ saved at Archive.org saved at Archive.is
- ↑ https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf saved at Archive.org
- ↑ https://en.wikipedia.org/wiki/Mobile_phone_tracking
- ↑ http://web.archive.org/web/20150417071618/http://radar.oreilly.com/2011/04/apple-location-tracking.html
- ↑ http://archive.today/2020.12.04-174303/https://www.wsj.com/articles/SB10001424052748703983704576277101723453610
- ↑ https://www.wired.com/story/strava-heat-map-military-bases-fitness-trackers-privacy/
- ↑ http://archive.today/2024.11.01-185522/https://xcancel.com/tobiaschneider/status/957317886112124928
- ↑ https://freethoughtblogs.com/stderr/2018/01/21/that-was-too-easy/
- ↑ https://www.govtech.com/blogs/lohrmann-on-cybersecurity/will-a-smartphone-replace-your-pc.html
- ↑ https://www.wired.com/2015/02/smartphone-only-computer/
- ↑ https://www.extremetech.com/computing/134868-there-can-only-be-one-smartphones-are-the-pcs-of-the-future
- ↑ https://www.broadbandsearch.net/blog/mobile-desktop-internet-usage-statistics
- ↑ https://techjury.net/blog/mobile-vs-desktop-usage/
- ↑ https://en.wikipedia.org/wiki/Modular_smartphone
- ↑ How any cell phone can be tracked, censiCLICK, April 30, 2022 - https://www.youtube.com/watch?v=c1uOox8v73Y
- ↑ Skynet 2024: The Infrastructure is Complete!, Rob Braxman Tech, April 17, 2024 - https://www.youtube.com/watch?v=9xPjIfJI5Jk
- ↑ Google Created a New Device Tracking Network, Mental Outlaw, April 9, 2024 - https://www.youtube.com/watch?v=62Zp9DRIyNI
- ↑ https://www.wired.com/story/google-cancels-project-ara/