mobiles

Pattern passwords on your phone

Posted on

Facial recognition, fingerprints and iris scanning have all joined PINs, passcodes and swipe patterns. But which should you be using? Along with passcodes, passwords and patterns, smartphone manufacturers are now implementing biometric security processes such as Face ID and iris scanning onto Android and iOS devices to give users a quicker, more convenient way of […]

mobiles

Foreign Spy Agencies Want Your Texts

Posted on

A new amendment has been introduced in parliament looking to allow for the easier sharing of communications data between Australia’s law enforcement and spy agencies and foreign governments. It comes in response to calls that spy agencies are being left behind without timely access to messaging apps with cloud servers in foreign jurisdictions. It would […]

mobiles

Mobile phone extraction

Posted on

In this piece we examine mobile phone extraction, relying on publicly available information and Privacy International’s experience from conducting mobile phone extraction using a Cellebrite UFED Touch 2. Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, […]

mobiles

5G risk assessment

Posted on

5G is on the way, but there’s no reason to start running around with your pants on your head just yet. While there will be a lot of hoopla about 5G in the CBD area of major cities there is a very large infrastructure network that will have to be put in place. Think at […]

anonymity

The Spycraft Revolution

Posted on

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The biggest disruptive force is technological. Traditional spycraft has always relied on deception based on identity. Spotting, developing, recruiting, running, and servicing intelligence sources involves concealing what you are doing.  Not anymore. A cover identity that would have been almost bulletproof […]

mobiles

Check Your Android VPN

Posted on

Granting permissions to apps takes a certain level of trust—trust that an app is honest about the parts of your phone’s hardware and operating system it has access to, and what it does with the data therein. Trust is especially crucial with VPN apps, the point of which is to obfuscate your mobile internet activity from unwanted […]

mobiles

Phone Hacking Fears and Facts

Posted on

The lack of security built into phone networks leaves callers vulnerable to snooping, but the growth of encrypted communications will help protect privacy. Apple’s ongoing standoff with the government over passcode-protected iPhones is still raising unprecedented alarms over smartphone security and privacy.  The good news: Although the SS7 system will indeed work for spying on […]

mobiles

Clone A Phone

Posted on

It might surprise you, but there are plenty of ways to learn how to clone a phone without touching it. It doesn’t matter if you wish to clone an Android, Windows, or an iOS device – you can easily clone the target phone and obtain crucial information related to it. By exploiting some vulnerability on […]

mobiles

Using Android Without Google

Posted on

As soon as you start up a new Android phone, you get prompted to sign in with your Google account — but what if you don’t want to do that? Maybe you want to take advantage of Android but limit what Google knows about you, or maybe you just prefer the alternative apps; whatever the case, […]