Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
2 votes
0 answers
40 views

Google security and 'find my device' - confusing info [closed]

My Samsung Android phone was stolen 4 days ago while on vacation in Rome. I also have a Samsung Android tablet with me and I am trying to use it to help remote wipe the Samsung phone. Both are fully ...
Steerpike's user avatar
  • 121
1 vote
0 answers
131 views

Is Android SOS being used as privilege escalation or settings bypass?

I have been getting random SOS countdowns triggered on my phone. Every time this happens, a pop-up appears telling me that unknown numbers have been temporarily unblocked. The most recent instance was ...
Miles's user avatar
  • 111
2 votes
0 answers
166 views

Is a mobile phone number in itself an information that can be utilized by hackers etc? [duplicate]

I recently installed Tinder, and I saw that the app warns about sharing your phone number to avoid being hacked. I also noticed certain obviously fake profiles pressing for getting a phone number or ...
smith's user avatar
  • 167
1 vote
0 answers
4k views

How does phone tracking by police work?

For android phones in India can police get a phone's IMEI number just by using that phone's number? also suppose if a phone was moving around within few miles radius for few days and it was turned ...
Ezio's user avatar
  • 35
2 votes
0 answers
345 views

Can I determine whether my phone probes base transmission station (BTS) without a SIM card?

This question is related to another inquiry on this site: Can Android phone running without SIM card be tracked (localized) by police? Accepted answer claims that: Without a SIM, your cell phone ...
Luntri's user avatar
  • 172
2 votes
2 answers
2k views

Can an android phone that is flashed to a trusted safe rom still be malicious?

I'm in the market for a new phone. The cheapest ones with decent specs are from China. Unfortunately I've read articles of phones sending data back to China for spying purposes. The phone I am looking ...
Terence Chow's user avatar
5 votes
1 answer
5k views

What are the privacy implications of the "Your Phone" app on Windows?

I'm trying to decide whether or not to use the Your Phone app on Windows, and not finding much information on it. It requires a Microsoft account, but I don't really see why that should be necessary ...
user541686's user avatar
  • 2,582
0 votes
1 answer
3k views

Is Android encryption secure? [duplicate]

As far as I know Android (Pie) is encrypted by default with some hardware-based password. But how secure is this encryption? I am not talking about password compromise, but if somebody gets my phone,...
user avatar
1 vote
0 answers
347 views

Why does Samsung access my contacts and storage if I use their store? [closed]

If I want to access the Galaxy Store on a Samsung Galaxy phone I have to agree to a set of terms (Legal information). These terms are excerpted below: All content made available to you by the ...
Zebrafish's user avatar
  • 111
0 votes
0 answers
553 views

What is the method police use to recover deleted data from phone memory?

I am writing a story that involves a cellphone being recovered at a crime scene. The police go through it and find all the non-deleted files and continue until a they do something to obtain the data ...
Kennichi Nitta's user avatar
0 votes
0 answers
348 views

Access Android files without entering pass-code

I have a Samsung A5 from a friend. Her screen is totally broken (black) and she wants me to recover her files. The problem is that you need to enter the pass-code of the phone in order to be able to ...
O'Niel's user avatar
  • 3,478
6 votes
2 answers
14k views

How secure is full-disk encryption technology on LineageOS, or Android phones in general?

We're attempting to assess the information security on our mobile devices, and information seems rather varied on the question of encryption. Is the encryption technology employed by Android-based ...
user11272717's user avatar
0 votes
1 answer
334 views

On a mobile, does using a password instead of a PIN make encryption stronger?

On a mobile, does using a password instead of a PIN make encryption stronger? What key does the phone use for its encryption? Would it use the PIN itself?
Alberto Salvia Novella's user avatar
1 vote
2 answers
673 views

How are USSD messages used and who could send them?

Some illegal ads started showing up on my Android phone as message boxes recently. They are said to be "USSD messages" in an app recording notifications (com.evanhe.nhfree). There is a Wikipedia ...
user23013's user avatar
  • 750
1 vote
2 answers
162 views

At What Point Does A Device Correspond/Link to its Owner?

I am aware that governments, organizations and hackers can do a plethora of things to your device (i.e. track your location, tap calls, etc.), but I can only assume that they can only do these things ...
Cobie Fisher's user avatar
2 votes
1 answer
336 views

Phone Number Appears to Have Been Temporarily Hijacked

What Happened: At 8:40am Telegram sends me a login code via the Telegram desktop app. At 8:44am Telegram informs me that someone has logged into my account via ip address #1 (appears to be PIA vpn) I ...
rhythmthumper's user avatar
2 votes
1 answer
605 views

Are there any known exploits targeting Google Authenticator on Android phones?

My Android 7.0 phone is somewhat lagging behind on the security updates, a situation I cannot change unfortunately (unless I would root the phone). I am not too concerned about this in general since ...
Bert Zangle's user avatar
3 votes
3 answers
11k views

I connected to a suspicious public wifi using my phone. Is it possible that my phone was hacked?

I recently was outside looking for public wifi because my android mobile internet wasn't very good. I went past a garage that had free wifi apparently, so I went up there and connected to their wifi. ...
user173395's user avatar
0 votes
1 answer
253 views

Found recording of unkown phone call - did someone hack my Android phone? [closed]

I installed a phone recorder on my Android just to have memories of my mother's calls. Yesterday the memory was full, and in the call history I found an unknown number I know I never answered to. And ...
Oma's user avatar
  • 7
86 votes
3 answers
15k views

Can phone apps read my clipboard?

Via Hacker News, I came across a Tweet implying that Facebook's iOS app routinely reads and transmits all content from the user's pasteboard. Leaving aside whether Facebook's app genuinely does this (...
Mark Amery's user avatar
  • 1,827
5 votes
1 answer
794 views

Is it possible to hack a phone just inputting dialer codes?

I'm currently in Germany, and today a woman asked if she could borrow my phone on the street, as she needed to make an urgent call. The thing is that I lended her my phone and, while I was making sure ...
Rotsen's user avatar
  • 51
3 votes
1 answer
7k views

Is there a risk with making my Device ID public?

When making a mobile app with ads, I am required to register my test phones as test devices by providing the Device ID. These Device IDs are unique to an individual phone. Is there any risk with ...
Evorlor's user avatar
  • 635
2 votes
2 answers
434 views

What should I do if my Android was hacked?

I know my Android phone was hacked and now, the hacker can take snaps with my front/back camera, register videos, view/send SMS and access everything on my phone. I can suppose he installed an .apk ...
Lari Alexandru's user avatar
1 vote
1 answer
7k views

Should the MEID, PESN, IMEI1 and IMEI2 numbers be kept secret?

On my Huawei PLK-AL10, when I type *#06# in the dialer, a window named MEID_IMEI would pop up and display some random strings. Note that someone can get this information through the "Emergency call" ...
nalzok's user avatar
  • 779
1 vote
2 answers
4k views

Is this Android malware?

I am randomly getting redirected to a page that looks very suspicious, especially the URL that sends the base64 encoded payload. It usually happens when I click a news link, usually a local news site. ...
rys's user avatar
  • 123
2 votes
1 answer
2k views

How to i disguise my phone as a tablet/computer? [closed]

Where I work, the wifi blocks phones. So currently, when I use my phone to help me complete my work it uses almost all of my "data". I can't afford a tablet or a larger data package. Is there any ...
cherry spoke's user avatar
2 votes
0 answers
69 views

How can I ensure that phone app traffic is using HTTPS? [duplicate]

When I access a website, I know just by looking at the URL whether it's HTTPS or HTTP. If I'm using an app on my phone, I cannot see this. So if say the app wants me to enter a password in to create ...
stickman's user avatar
  • 1,590
6 votes
2 answers
3k views

Security implications of android rooting [duplicate]

I know this question has been asked many times, but I didn't see a clear answer to it from security experts, or it is from several years ago and things might have changed. My question is double: ...
thomasUJ's user avatar
1 vote
2 answers
2k views

Could one fit a root application in sim card

In the third Mr.Robot episode a character inserted a Micro-SD card in a smartphone in order to root it and gain information, so I thought maybe someone could fit a root-kit on a Sim-card. Would that ...
McLinux's user avatar
  • 111
1 vote
1 answer
872 views

Is there any way track a Andriod phone using IMEI Number [closed]

I have lost my phone and I have a IMEI number of it. However, the guy removed my SIM card. Is there any way to track who is using my phone?
Xyed Xain Haider's user avatar
1 vote
1 answer
433 views

Secure voice app [closed]

When I look in the Google play store (android apps market), I see that there are a lot of apps to make secure phone calls. However, all the apps I have seen so far all seem to use data packets over 3G/...
user3231622's user avatar
4 votes
2 answers
791 views

Offline phone security

How secure is an offline android phone? Some background. I want to use an app called Bither on android, which allows me to create a cold wallet on 1 phone and a hot wallet on another phone. Cold ...
oshirowanen's user avatar
32 votes
2 answers
191k views

Can Android phone running without SIM card be tracked (localized) by police?

I am running an Android phone without a SIM card. I am using it for web surfing. Can the police localize my phone using the cell towers (BTS)? In other words, I know Android phones emit radiations ...
yasserbn's user avatar
  • 423
11 votes
2 answers
2k views

How do I protect my Gmail account when accessing it via an Android smartphone?

I have a Gmail account that I also access via an Android smartphone. The mail account could be used to reset passwords for other online accounts, so I want to tighten up the security around this ...
Mad Scientist's user avatar
34 votes
3 answers
3k views

Security implications of rooting Android

My Android smart phone has fancy features that I can get only if I root it, e.g., free-wifi tethering or Cisco VPN (with group name/password). However, the procedure to root my phone makes me ...
dr jimbob's user avatar
  • 39.5k
32 votes
4 answers
1k views

Android security without updates

I have an android phone which, like many others, has quickly become unsupported and is not receiving any updates. At the same time there are publicly available exploits for privilege-escalation ...
android user's user avatar