All Questions
36 questions
2
votes
0
answers
40
views
Google security and 'find my device' - confusing info [closed]
My Samsung Android phone was stolen 4 days ago while on vacation in Rome. I also have a Samsung Android tablet with me and I am trying to use it to help remote wipe the Samsung phone. Both are fully ...
1
vote
0
answers
131
views
Is Android SOS being used as privilege escalation or settings bypass?
I have been getting random SOS countdowns triggered on my phone. Every time this happens, a pop-up appears telling me that unknown numbers have been temporarily unblocked. The most recent instance was ...
2
votes
0
answers
166
views
Is a mobile phone number in itself an information that can be utilized by hackers etc? [duplicate]
I recently installed Tinder, and I saw that the app warns about sharing your phone number to avoid being hacked.
I also noticed certain obviously fake profiles pressing for getting a phone number or ...
1
vote
0
answers
4k
views
How does phone tracking by police work?
For android phones in India
can police get a phone's IMEI number just by using that phone's number?
also suppose if a phone was moving around within few miles radius for few days and it was turned ...
2
votes
0
answers
345
views
Can I determine whether my phone probes base transmission station (BTS) without a SIM card?
This question is related to another inquiry on this site: Can Android phone running without SIM card be tracked (localized) by police?
Accepted answer claims that:
Without a SIM, your cell phone ...
2
votes
2
answers
2k
views
Can an android phone that is flashed to a trusted safe rom still be malicious?
I'm in the market for a new phone. The cheapest ones with decent specs are from China. Unfortunately I've read articles of phones sending data back to China for spying purposes.
The phone I am looking ...
5
votes
1
answer
5k
views
What are the privacy implications of the "Your Phone" app on Windows?
I'm trying to decide whether or not to use the Your Phone app on Windows, and not finding much information on it.
It requires a Microsoft account, but I don't really see why that should be necessary ...
0
votes
1
answer
3k
views
Is Android encryption secure? [duplicate]
As far as I know Android (Pie) is encrypted by default with some hardware-based password. But how secure is this encryption?
I am not talking about password compromise, but if somebody gets my phone,...
1
vote
0
answers
347
views
Why does Samsung access my contacts and storage if I use their store? [closed]
If I want to access the Galaxy Store on a Samsung Galaxy phone I have to agree to a set of terms (Legal information). These terms are excerpted below:
All content made available to you by the ...
0
votes
0
answers
553
views
What is the method police use to recover deleted data from phone memory?
I am writing a story that involves a cellphone being recovered at a crime scene. The police go through it and find all the non-deleted files and continue until a they do something to obtain the data ...
0
votes
0
answers
348
views
Access Android files without entering pass-code
I have a Samsung A5 from a friend. Her screen is totally broken (black) and she wants me to recover her files.
The problem is that you need to enter the pass-code of the phone in order to be able to ...
6
votes
2
answers
14k
views
How secure is full-disk encryption technology on LineageOS, or Android phones in general?
We're attempting to assess the information security on our mobile devices, and information seems rather varied on the question of encryption. Is the encryption technology employed by Android-based ...
0
votes
1
answer
334
views
On a mobile, does using a password instead of a PIN make encryption stronger?
On a mobile, does using a password instead of a PIN make encryption stronger?
What key does the phone use for its encryption? Would it use the PIN itself?
1
vote
2
answers
673
views
How are USSD messages used and who could send them?
Some illegal ads started showing up on my Android phone as message boxes recently. They are said to be "USSD messages" in an app recording notifications (com.evanhe.nhfree).
There is a Wikipedia ...
1
vote
2
answers
162
views
At What Point Does A Device Correspond/Link to its Owner?
I am aware that governments, organizations and hackers can do a plethora of things to your device (i.e. track your location, tap calls, etc.), but I can only assume that they can only do these things ...
2
votes
1
answer
336
views
Phone Number Appears to Have Been Temporarily Hijacked
What Happened:
At 8:40am Telegram sends me a login code via the Telegram desktop app.
At 8:44am Telegram informs me that someone has logged into my
account via ip address #1 (appears to be PIA vpn)
I ...
2
votes
1
answer
605
views
Are there any known exploits targeting Google Authenticator on Android phones?
My Android 7.0 phone is somewhat lagging behind on the security updates, a situation I cannot change unfortunately (unless I would root the phone).
I am not too concerned about this in general since ...
3
votes
3
answers
11k
views
I connected to a suspicious public wifi using my phone. Is it possible that my phone was hacked?
I recently was outside looking for public wifi because my android mobile internet wasn't very good. I went past a garage that had free wifi apparently, so I went up there and connected to their wifi.
...
0
votes
1
answer
253
views
Found recording of unkown phone call - did someone hack my Android phone? [closed]
I installed a phone recorder on my Android just to have memories of my mother's calls. Yesterday the memory was full, and in the call history I found an unknown number I know I never answered to. And ...
86
votes
3
answers
15k
views
Can phone apps read my clipboard?
Via Hacker News, I came across a Tweet implying that Facebook's iOS app routinely reads and transmits all content from the user's pasteboard.
Leaving aside whether Facebook's app genuinely does this (...
5
votes
1
answer
794
views
Is it possible to hack a phone just inputting dialer codes?
I'm currently in Germany, and today a woman asked if she could borrow my phone on the street, as she needed to make an urgent call. The thing is that I lended her my phone and, while I was making sure ...
3
votes
1
answer
7k
views
Is there a risk with making my Device ID public?
When making a mobile app with ads, I am required to register my test phones as test devices by providing the Device ID. These Device IDs are unique to an individual phone. Is there any risk with ...
2
votes
2
answers
434
views
What should I do if my Android was hacked?
I know my Android phone was hacked and now, the hacker can take snaps with my front/back camera, register videos, view/send SMS and access everything on my phone. I can suppose he installed an .apk ...
1
vote
1
answer
7k
views
Should the MEID, PESN, IMEI1 and IMEI2 numbers be kept secret?
On my Huawei PLK-AL10, when I type *#06# in the dialer, a window named MEID_IMEI would pop up and display some random strings. Note that someone can get this information through the "Emergency call" ...
1
vote
2
answers
4k
views
Is this Android malware?
I am randomly getting redirected to a page that looks very suspicious, especially the URL that sends the base64 encoded payload. It usually happens when I click a news link, usually a local news site. ...
2
votes
1
answer
2k
views
How to i disguise my phone as a tablet/computer? [closed]
Where I work, the wifi blocks phones. So currently, when I use my phone to help me complete my work it uses almost all of my "data". I can't afford a tablet or a larger data package.
Is there any ...
2
votes
0
answers
69
views
How can I ensure that phone app traffic is using HTTPS? [duplicate]
When I access a website, I know just by looking at the URL whether it's HTTPS or HTTP.
If I'm using an app on my phone, I cannot see this. So if say the app wants me to enter a password in to create ...
6
votes
2
answers
3k
views
Security implications of android rooting [duplicate]
I know this question has been asked many times, but I didn't see a clear answer to it from security experts, or it is from several years ago and things might have changed.
My question is double:
...
1
vote
2
answers
2k
views
Could one fit a root application in sim card
In the third Mr.Robot episode a character inserted a Micro-SD card in a smartphone in order to root it and gain information, so I thought maybe someone could fit a root-kit on a Sim-card. Would that ...
1
vote
1
answer
872
views
Is there any way track a Andriod phone using IMEI Number [closed]
I have lost my phone and I have a IMEI number of it. However, the guy removed my SIM card.
Is there any way to track who is using my phone?
1
vote
1
answer
433
views
Secure voice app [closed]
When I look in the Google play store (android apps market), I see that there are a lot of apps to make secure phone calls. However, all the apps I have seen so far all seem to use data packets over 3G/...
4
votes
2
answers
791
views
Offline phone security
How secure is an offline android phone?
Some background. I want to use an app called Bither on android, which allows me to create a cold wallet on 1 phone and a hot wallet on another phone.
Cold ...
32
votes
2
answers
191k
views
Can Android phone running without SIM card be tracked (localized) by police?
I am running an Android phone without a SIM card. I am using it for web surfing.
Can the police localize my phone using the cell towers (BTS)?
In other words, I know Android phones emit radiations ...
11
votes
2
answers
2k
views
How do I protect my Gmail account when accessing it via an Android smartphone?
I have a Gmail account that I also access via an Android smartphone. The mail account could be used to reset passwords for other online accounts, so I want to tighten up the security around this ...
34
votes
3
answers
3k
views
Security implications of rooting Android
My Android smart phone has fancy features that I can get only if I root it, e.g., free-wifi tethering or Cisco VPN (with group name/password). However, the procedure to root my phone makes me ...
32
votes
4
answers
1k
views
Android security without updates
I have an android phone which, like many others, has quickly become unsupported and is not receiving any updates. At the same time there are publicly available exploits for privilege-escalation ...