Very useful and now almost essential, smartphones are a huge threat to our privacy. that's how

5 ways you can spy through mobile: smartphones are a huge threat to your privacy

Very useful and now almost essential, smartphones are a huge threat to our privacy. that's how
As much as you can put, hackers seem to always have an edge. In a hypothetical game of chess, they would be in front of at least one or two moves, with the ability to be able to foresee what others will do and immediately find suitable countermeasures. So, when you have to find countermeasures to protect your privacy, you need to know where the attacks can come from.

And the smartphone is one of the most used tools to “spy on” (or, to use a softer language, to keep track of your activities). Taking advantage of sensors and hardware components inside, a hacker could not only read our email or access the photo gallery, but could also follow all our movements, know where we are and where we are heading. In short, if someone managed to sneak into the phone, he could know everything (or almost) about our life.

How can you spy on your smartphone

Unlike what is believed, then, the malicious digital do not even have to work too hard to be able to steal information from smartphones “careless”. In the following paragraphs, for example, we will describe 5 ways in which you can spy on your smartphone without you having the slightest suspicion that it is happening. On the contrary: most of the time it is the user himself who absently provides this information, thus making the game of digital pirates looking for data and information to be resold on the dark web.

Log in on the web

Every time you log in to Facebook, Gmail or any other online service, the service manager will be able to discover (even if broadly speaking) the location from which you connect. True, this is not very precise data, but will allow you to provide more or less useful “accessories” services: by exploiting these data, for example, social networks and e-mail platforms will be able to recognize unauthorized access and report them. At the same time, however, this allows the manager to know your movements and always know where you are whenever you use his service. In this way, for example, you will be able to show you geolocated advertising related to services or activities in your area.

Tagging the photos

Although most will seem harmless action, when you are editing a photo (either adding the name, or adding the location where you are) you are giving away precious personal information. In particular, think twice about tagging photos that you will then share publicly: many thieves (the real ones, not hackers) scan the Internet looking for people on holiday to be able to present at home and act undisturbed.

Using Wi-Fi

How many times, while we are on holiday, do we go looking for bars or cafes with public Wi-Fi and free to have a stable connection without the risk of exceeding the thresholds of European roaming ? Here, when we do, let’s remember that the connection is not exactly free. We pay you with our personal information such as an e-mail address or mobile number (data used to log in), places you’re most often in, and so on. This information is then used to show you advertisements related to your preferences and habits the next time you connect. This, of course, giving good security of Wi-Fi hotspots. As you know, hackers often exploit the flaws of public wireless networks to attack connected users and steal their data.

Turning on the smartphone

Even if you disable GPS and any other form of geolocation, our smartphone (but also mobile) will still be traceable and localizable. Such as? Thanks to the cellular network, of course. To work perfectly, the cellular network must be able to precisely locate where the receiver devices are located (the so-called triangulation): in this way you can set the time of the phones, make them connect to the nearest tower (and with the strongest signal ) and much more.