US military officials recently appeared to monitor military militants through a heat map near their bases in any part of the world, through digital fitness monitoring applications and exercise tracking applications.

With the growing number of smartphones growing in popularity, the respect they have for security and confidentiality has also been questioned. Although it is constantly updated by manufacturers and services such as secure storage areas, it is certain that many of the secrets of smartphones are being released. Finally, in the United States, Senator Richard Blumenthal proved once more that he was reluctant to conduct investigations into whether soldiers’ sensitive data had been watched.

Researchers demonstrate how users are monitored through various applications even when they shut down location services. The security deficit comes not only from GPS and communication interfaces, but also from a wide range of sensors equipped with gauges and gyroscopes and accelerometers that can be measured vertically or laterally, and other movements. The applications available in the market can be used to fulfill the tasks that users are not expecting.

Many people expect that turning off location services on their phones will disable such mobile surveillance. However, studies conducted by Northeastern University’s Sashank Narain, Triet Vo-Huu, Ken Block and Admiral Sanatinia on an area called “side-channel attacks” showed that applications could avoid these restrictions.

Researchers have found that mobile phones can tell the user how to handle passwords, track finger movements, or even where you are in your pocket, where you are and where you go to data companies.

Assumptions About Attackers

Designers and engineers make assumptions about potential attacks to ensure the safety of a device during its development. Engineers who design a car, for example, try to make the vehicle the safest possible cost frame by adding potential accidents to the account. Airbags, seat belts, and more robust body designs are examples of this. However, it is not possible to prevent a vehicle from being crushed under a large piece of rock, even if trying to avoid problems in the design sense.

Similarly, people who design software and hardware are hypothetical about what hackers can do. However, this does not mean that the devices are safe. The first side channel attack was detected by cryptographic specialist Paul Kocher in 1996 and showed how the encryption systems could be secured. Today, many giant tech companies are able to distribute money in certain amounts because they find their exploits to hackers.

Mobile devices are also ready for many attacks because the designers do not add up and they are developed from the outside. Of course, security solutions such as passwords and fingerprints developed by engineers are available, but they only aim at preventing physical interventions.

Mobile phones are often filled with sensors that include at least one accelerometer, a gyroscope, a magnetometer, a barometer, up to four microphones, one or two cameras, a thermometer, a pedometer, a light sensor and a humidity sensor.

For hackers, it is quite easy to use these sensors outside of their intended purpose. An application developed by experts in the near future will reach certain data by following the keyboard movements of people. Experts have the ability to reach a variety of sources by combining the information from the gyroscope and microphones of the phone (sounds produced during touching). Researchers continue to work on such side channel attacks. Which means we can not be safe if we use whichever phone we use.


Like it? Share with your friends!

What's Your Reaction?

Angry Angry
55
Angry
Confused Confused
44
Confused
CRY CRY
33
CRY
Damn Damn
22
Damn
Dislike Dislike
11
Dislike
Happy Happy
110
Happy
Laughcry Laughcry
99
Laughcry
Love Love
88
Love
Scary Scary
77
Scary
hate hate
11
hate
fail fail
44
fail
fun fun
33
fun
geeky geeky
22
geeky
lol lol
110
lol
omg omg
88
omg
win win
66
win
admin

Novice

0 Comments

Choose A Format
Personality quiz
Series of questions that intends to reveal something about the personality
Trivia quiz
Series of questions with right and wrong answers that intends to check knowledge
Poll
Voting to make decisions or determine opinions
Story
Formatted Text with Embeds and Visuals
List
The Classic Internet Listicles
Countdown
The Classic Internet Countdowns
Open List
Submit your own item and vote up for the best submission
Ranked List
Upvote or downvote to decide the best list item
Meme
Upload your own images to make custom memes
Video
Youtube, Vimeo or Vine Embeds
Audio
Soundcloud or Mixcloud Embeds
Image
Photo or GIF
Gif
GIF format