On 08/09/13 12:30, Fernando Negro wrote: > The *NSA can tap into Android systems(!)* (and also other, > non-Linux, mobile devices). > > There's an initial report here: > http://rt.com/news/nsa-smart-phones-spying-563/ > > And, I'll probably post some more links about the Android part (that > most interests me) once I find some more information about this. > > In the meantime, everyone else feel free to add more information > about this...
Also, firmware is a major problem. For example, this appears to be the problem here: http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/ Contact lists, SMS traffic etc. isn't really surprising. To my knowledge, anything on the SIM card is up for grabs on most mobile phones. I was rather intrigued when my father told me he did a complete SIM backup of my brick/dumbphone across the internet, without my knowledge (my parents have the password, since they set it up) and while my phone was off. Apparently the backup feature was advertised as being useful for backing up contacts etc. I'm guessing my provider must somehow get a copy of it when I turn on my phone and store it. It wasn't really too worrying for me, because I take the battery out of it when I'm not using it (and I only turn it on 1-2 times per week to check for messages). -- Andrew Roffey http://andrew.roffey.org GPG fingerprint F9E6 E6C4 0080 85F4 0E30 B0D9 7F7B DC7F 9657 B073
