On 08/09/13 12:30, Fernando Negro wrote:
> The *NSA can tap into Android systems(!)* (and also other,
> non-Linux, mobile devices).
> 
> There's an initial report here: 
> http://rt.com/news/nsa-smart-phones-spying-563/
> 
> And, I'll probably post some more links about the Android part (that 
> most interests me) once I find some more information about this.
> 
> In the meantime, everyone else feel free to add more information 
> about this...

Also, firmware is a major problem. For example, this appears to be the
problem here:

http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/

Contact lists, SMS traffic etc. isn't really surprising. To my
knowledge, anything on the SIM card is up for grabs on most mobile phones.

I was rather intrigued when my father told me he did a complete SIM
backup of my brick/dumbphone across the internet, without my knowledge
(my parents have the password, since they set it up) and while my phone
was off. Apparently the backup feature was advertised as being useful
for backing up contacts etc. I'm guessing my provider must somehow get a
copy of it when I turn on my phone and store it.

It wasn't really too worrying for me, because I take the battery out of
it when I'm not using it (and I only turn it on 1-2 times per week to
check for messages).

-- 
Andrew Roffey     http://andrew.roffey.org
GPG fingerprint   F9E6 E6C4 0080 85F4 0E30 B0D9 7F7B DC7F 9657 B073

Reply via email to