ross549 Posted June 24, 2014 Share Posted June 24, 2014 http://www.fastcompany.com/3032330/fast-feed/if-your-smartphone-was-just-hacked-by-the-government-this-could-be-how-it-happened Galileo attacks a variety of mobile operating systems, including iOS, Android, Windows Mobile, and BlackBerry, and can capture anything from keystrokes to voice and video content to calendar entries. It can even reportedly map the movement of a target on Google Maps, and can disguise its activities carefully, monitoring the battery life of the device and then performing energy-intensive tasks only when plugged in. Yikes! 2 Quote Link to comment Share on other sites More sharing options...
ebrke Posted June 24, 2014 Share Posted June 24, 2014 Glad I don't need/can't afford a smart phone. I have enough worries already! 1 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 24, 2014 Share Posted June 24, 2014 I am glad someone finally is talking about this. Quote Link to comment Share on other sites More sharing options...
ross549 Posted June 24, 2014 Author Share Posted June 24, 2014 I think the risk of compromise/infection is far lower on smartphones... they were designed in the past few years, with security in mind. Adam 1 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 24, 2014 Share Posted June 24, 2014 Maybe, not sure. I had heard about this but no details for a while now. Quote Link to comment Share on other sites More sharing options...
ross549 Posted June 24, 2014 Author Share Posted June 24, 2014 The key takeaway in this article is that is is NOT blanket surveillance. The device must be compromised first through jailbreaking/malware. Adam 1 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 24, 2014 Share Posted June 24, 2014 Very true. Same with most 'computers' Quote Link to comment Share on other sites More sharing options...
securitybreach Posted June 25, 2014 Share Posted June 25, 2014 This is why I encrypt my phone and also keep "Unknown Sources" unchecked. That way I could only get infected if they managed to infect an application on the Market. Luckily I only use well known applications, read reviews on them and look at the permissions of said applications. Plus Eset notifies me of any changes to applications. Not saying it could not be done but there is minimal risk by my actions. Also if you are a target, they will find a way in.... Quote Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted June 25, 2014 Share Posted June 25, 2014 Ah... the joys of stupid phonedom. Quote Link to comment Share on other sites More sharing options...
securitybreach Posted June 25, 2014 Share Posted June 25, 2014 Ah... the joys of stupid phonedom. They can hack old phones even easier than the latest smartphones. Remember the whole "they can remotely turn on your device, record audio and take pictures" from the 1990s. Quote Link to comment Share on other sites More sharing options...
ross549 Posted June 25, 2014 Author Share Posted June 25, 2014 This is why I encrypt my phone and also keep "Unknown Sources" unchecked. I do not Jailbreak my phone for the same reason. Jailbreaking breaks the iOS security model in a big way. Adam 1 Quote Link to comment Share on other sites More sharing options...
securitybreach Posted June 25, 2014 Share Posted June 25, 2014 Agreed! One thing to note for the non-android users, rooting is not the same thing as jail-breaking: http://www.androidpit.com/jailbreak-android Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 25, 2014 Share Posted June 25, 2014 I do not Jailbreak my phone for the same reason. Jailbreaking breaks the iOS security model in a big way. Adam Same here. Agreed! One thing to note for the non-android users, rooting is not the same thing as jail-breaking: http://www.androidpi...ilbreak-android Exactly. Not the same thing at all. Quote Link to comment Share on other sites More sharing options...
abarbarian Posted June 25, 2014 Share Posted June 25, 2014 Glad I don't need/can't afford a smart phone. I have enough worries already! Me too. Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 25, 2014 Share Posted June 25, 2014 My smartphone is perfect for me and my business. Well worth it. Quote Link to comment Share on other sites More sharing options...
ebrke Posted June 25, 2014 Share Posted June 25, 2014 My smartphone is perfect for me and my business. Well worth it. Definitely good for you. I don't need one and can't see laying out the money and getting all the associated worries. 1 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 25, 2014 Share Posted June 25, 2014 I hear ya. Jim currently has a feature phone only. Quote Link to comment Share on other sites More sharing options...
Capt.Crow Posted June 25, 2014 Share Posted June 25, 2014 I got my MOJO. Never looked into what it can do . Prolly not much Quote Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted June 26, 2014 Share Posted June 26, 2014 No. I meant really stupid phones, Josh. 1 Quote Link to comment Share on other sites More sharing options...
securitybreach Posted June 26, 2014 Share Posted June 26, 2014 No. I meant really stupid phones, Josh. Well those are even easier to hack (tap)... Quote Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted June 26, 2014 Share Posted June 26, 2014 Yeah, that's how Wozniak and the other Apple dude got their starts. http://www.theatlantic.com/technology/archive/2013/02/the-definitive-story-of-steve-wozniak-steve-jobs-and-phone-phreaking/273331/ 3 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 26, 2014 Share Posted June 26, 2014 As well as many other curious hackers. Quote Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted June 26, 2014 Share Posted June 26, 2014 I never cared much about phone hacking. My crowd was into swiping crystals out of 10m ham rigs to use in CB radios; and later, doctoring PLL pins to achieve illegal high (10m) and low frequencies in our CBs. Oh, and we loved linear amplifiers, too. Those were fun days (actually, mostly nights... late, late nights). One of the most trickable CB radio ever made... Cybernet chassis JCPenneys Model 6247 40Ch SSB. I miss this ol' girl. I had this and a 6241 model. Both had three stages of frequencies by the time I was done tweaking them... 40 upper, 40 legal, and 40 lower. 2 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted June 27, 2014 Share Posted June 27, 2014 Hacking takes many forms. Jim was also more into electronics side of things, and now computers and networking, but he's always been intrigued by all aspects of taking things apart and putting them back together, fixing things, creating something knew, even the tools he needed to do an electronics job. My Dad was a bit of hacker himself; always doing all kinds of things with engines, early electronics, fixing things, and always building, creating. My Jim and my Dad respected each other very much. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.