@linuxmemes how can mobile phones possibly get hacked ?? I mean we use Android or iOS phones, which are pretty much secure, right ??🤔🤔🤔

  • 1dalm@lemmy.today
    link
    fedilink
    arrow-up
    3
    ·
    23 hours ago

    Almost all “hacks” of modern mainstream software involve users being stupid.

    If you hear about a “hack” of a major corporation or hospital or something, the things that is never reported is that it likely started with someone with more user permissions than sense opening a phishing email.

  • Björn@swg-empire.de
    link
    fedilink
    arrow-up
    18
    ·
    edit-2
    1 day ago

    Sir, this is a Wendy’s memes community.

    Although the amount of bad punctuation and emoticons might shift this into shitpost territory.

      • Cosmonaut_Collin@lemmy.world
        link
        fedilink
        arrow-up
        5
        ·
        2 days ago

        The only true secure way is to go back in time and stop the device from ever being created so no.one thinks to go back in time to stop you from throwing it into the sun. You may have to kill yourself though as you will be the only person who is aware of a phone that could have existed, if we are working with branching timeline theory.

      • Zron@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        2 days ago

        It’ll take months to get something to the sun. Better to bring the sun to it and vaporize it with Oxy Acetylene

    • hydroptic@sopuli.xyz
      link
      fedilink
      arrow-up
      5
      ·
      2 days ago

      Even that might not do it, if you don’t make sure you get the SSD chips (or spinny disks depending on what the device is)

      • SavvyWolf@pawb.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        Even then, it’s possible that there may be small embedded circuits inside the camera with the sole purpose of constantly recording and sending that data who knows where.

        You know, if you want to go full tinfoil hat.

        • hydroptic@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          2 days ago

          Oh yeah, absolutely true.

          Wonder if microwaving a device would be an easy way to make sure all the data storage is truly dead? Well, short of completely pulverizing it anyhow

      • Kairos@lemmy.today
        link
        fedilink
        arrow-up
        12
        ·
        2 days ago

        Yes but there’s always bugs and some of those bugs lead to privilege escalation. Phones mostly just remove the “user clicked yes on the root access prompt” attack. And other attack surface reductions.

      • terabyterex@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        2 days ago

        Quite the opposite. Every single text message you send inside the j ited stayes is saved by both the us and the chinese government. This is why you have to use signal.

        Also, if you connect to a stingray device then no hope of privacy

  • durinn@programming.dev
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    2 days ago

    I hate what popular culture has done with our perception of hacking. Hacking almost always involves social engineering as a means to open a backdoor into a system: you trick the end user into for instance giving up login credentials or installing a program that “phones home” to a command and control center. You’ll have to research the details on your own, but depending on what information has been “phoned home” or in other ways acquired by the adversary (login credentials, IP address, hardware and software identifiers, etc.), the adversary can then deploy further tools that either exploit known programmatic vulnerabilities or that elevate the adversary’s privileges on the target system, with the goal of attaining enough control to do whatever the objective was in the first place (gathering PII, bank info, leaking private media, distortion, what have you…).

    Android is great at a very specific task, which is to isolate processes into something I can’t seem to recall right now… Maybe “zygotes”? Basically it gives the user granular control over interprocess communication. It also effectively reduces attack surface by isolating infection/damage.

    On Windows, for instance, programs are allowed to elevate their own privileges - for the convenience of the end user, I suppose - which is of course INSANE, considering that the greater Windows user base probably don’t have the cyber hygiene required to operate safely within those premises.

    I’m too sleepy to go on, but “google” and read: hacking, backdoor, exploit, social engineering, privilege elevation