Mobile devices such as smartphones and tablets are considered really dangerous devices because they contain a large amount of our private and sensitive information and have the ability to monitor us. There are many types of exploits and specialized mobile applications that can damage information stored on smartphones or tablets. By the way, the number of malicious mobile applications is increasing and the Android operating system is the leader among them. However, two issues remind us that not only is Android dangerous, but iOS is dangerous as well. We have come across a lot of articles, people said that the iPhone and iPad can monitor us, and these functions are preset by the manufacturer. But the cell phone signal jammer website sells a jammer which can protect the signals of cellphones, which can protect our cellphones very well.
They said that iOS may contain Trojan horse applications that can collect and analyze user information, create photos and videos, and send all data to third parties. We can tell you on jammer-shop.com that this sentence is really not very clear, because in order to prove these words someone has to decipher the source code of iOS, which is the intellectual property of Apple Inc., and decipher it illegally.
But at the same time, there is a way to steal photos and video data from devices running iOS 6. The vulnerability is exploited in Safari browser. As long as it supports HTML5, criminals can use simple HTML code to steal data from it. This forces users to perform certain activities, but the backdoor exists. We hope it will be fixed in a future update. And the vulnerability does not require Flash or Silverlight plugins, so its range of use can be very wide.
It’s also worth mentioning that in September 2012, a hacker community called “anti-security” claimed that Apple was cooperating with the CIA and the FBI. The community also told them that in March 2012, they had hacked into a Dell Vostro laptop belonging to FBI agent Kristoffer Strangle. They found a file “NCFTA_iOS_devices_intel.csv”, which contained over 12 million unique device identifiers (UDIDs). Which UDID is related to device name, username, address and phone number. Isn’t that awful?
The FBI has officially denied the information, but independent experts have proven its authenticity. Hackers posted this information and many people found their names and devices on this list. Therefore, there are rumors that Apple’s gadgets might spy on us, which doesn’t seem strange and can’t prove it.
Another interesting fact here is that the unnecessarily collected photo and video information can be obtained through positioning data. Now, thanks to the integrated GPS / GLONASS module and the triangulation of the mobile phone tower, they can know the coordinates of each photo and even follow your position in real time. Thanks to the new positioning technology, you can see your position even in indoor areas where GPS is not available.
The realization of such data is possible thanks to the NAVSEA project developed by the army and the University of Indiana. This technology makes it possible to create a high-quality 3D model of the room where the phone is located. This is possible because the data from the accelerometer and the built-in compass are merged with the image itself. This model is much more useful for stealing sensitive data than a set of miscellaneous images.
Therefore, your mobile device may spy on you. Android already has several very dangerous applications, and now iOS has become fragile. It’s really hard to tell if the iPhone and iPad are spying on us, but it is best to consider protective measures before the danger arises, so it may be better to use a cell phone signal jammer. GSM / GPS to avoid tracking and avoid interference. Attempts to hide data transmission.