US military officials recently appeared to monitor military militants through a heat map near their bases in any part of the world, through digital fitness monitoring applications and exercise tracking applications.
With the growing number of smartphones growing in popularity, the respect they have for security and confidentiality has also been questioned. Although it is constantly updated by manufacturers and services such as secure storage areas, it is certain that many of the secrets of smartphones are being released. Finally, in the United States, Senator Richard Blumenthal proved once more that he was reluctant to conduct investigations into whether soldiers’ sensitive data had been watched.
Researchers demonstrate how users are monitored through various applications even when they shut down location services. The security deficit comes not only from GPS and communication interfaces, but also from a wide range of sensors equipped with gauges and gyroscopes and accelerometers that can be measured vertically or laterally, and other movements. The applications available in the market can be used to fulfill the tasks that users are not expecting.
Many people expect that turning off location services on their phones will disable such mobile surveillance. However, studies conducted by Northeastern University’s Sashank Narain, Triet Vo-Huu, Ken Block and Admiral Sanatinia on an area called “side-channel attacks” showed that applications could avoid these restrictions.
Researchers have found that mobile phones can tell the user how to handle passwords, track finger movements, or even where you are in your pocket, where you are and where you go to data companies.
Assumptions About Attackers
Designers and engineers make assumptions about potential attacks to ensure the safety of a device during its development. Engineers who design a car, for example, try to make the vehicle the safest possible cost frame by adding potential accidents to the account. Airbags, seat belts, and more robust body designs are examples of this. However, it is not possible to prevent a vehicle from being crushed under a large piece of rock, even if trying to avoid problems in the design sense.
Similarly, people who design software and hardware are hypothetical about what hackers can do. However, this does not mean that the devices are safe. The first side channel attack was detected by cryptographic specialist Paul Kocher in 1996 and showed how the encryption systems could be secured. Today, many giant tech companies are able to distribute money in certain amounts because they find their exploits to hackers.
Mobile devices are also ready for many attacks because the designers do not add up and they are developed from the outside. Of course, security solutions such as passwords and fingerprints developed by engineers are available, but they only aim at preventing physical interventions.
Mobile phones are often filled with sensors that include at least one accelerometer, a gyroscope, a magnetometer, a barometer, up to four microphones, one or two cameras, a thermometer, a pedometer, a light sensor and a humidity sensor.
For hackers, it is quite easy to use these sensors outside of their intended purpose. An application developed by experts in the near future will reach certain data by following the keyboard movements of people. Experts have the ability to reach a variety of sources by combining the information from the gyroscope and microphones of the phone (sounds produced during touching). Researchers continue to work on such side channel attacks. Which means we can not be safe if we use whichever phone we use.