(Responding to both andrew's and Chris' comments above...)

The phone companies can access people's mobile phones, even when they are (apparently) turned off, and turn on the microphone in it, at least (and, therefore, turn them into listening devices). (Besides the fact that every mobile phone is a tracking device, as everyone already knows.)

http://www.youtube.com/watch?v=0G1fNjK9SXg

Of this, I already knew for many years. And I've always suspected that it must be some parallel circuits that are built into mobile phones, that bypass the normal circuits. (And, from what I know, I've always assumed that the phones are built in a way that lets the companies remotely read a person's SIM card, also.)

But, from what I read now (about accessing "notes" and "data", and running "scripts" on iPhones) it seems that they can access the drives(?) of modern-day smartphones also(?)*. And, if that's the case, I suspect it must have to be done with the help of some *firmware*.

And it's the latter part that I'm most interested in. Because, if that's the case, it's a very good example of what happens when you start adding proprietary firmware/blobs (to Linux)... It compromises the security of the equipment.

Anyway... We'll have to wait for the details. The original source (http://www.spiegel.de/international/world/a-920971.html) says: "Visit SPIEGEL ONLINE International on Monday for the full article."


---
* (I've never used a smartphone, so I don't know if one can keep "notes" and "data" on a SIM card, and run "scripts" on them(?)...)

Reply via email to