Wait, the CIA can comprimise my iPhone or Android
|Christian Hargrave in Android Tuesday, March 14, 2017|
CIA hacking methods exposed by Wikileaks proves your browsing and mobile device aren't safe.
The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program called Weeping Angel even uses Samsung smart TVs as secret listening devices that operate even when TV is turned off, recording the conversations and sending them on Internet to a covert C.I.A. server.
While it’s understandable that governments do take advantage of the new technologies in their operations, it’s also possible that newly disclosed C.I.A.’s hacking methods will cause more harm than benefit. The cyberweapons described include programs that crash a targeted computer or steal passwords, or malware that can record keystrokes on a mobile device without breaking encryption.
Recently, there have been huge Internet liberty crackdowns around the world - such as the introduction of strict data retention laws (i.e. in the UK, Poland, etc.) and laws attacking communications apps such as WhatsApp and Viber, as well as blocking certain social media sites. These crackdowns on communications apps and social media sites goes hand-in-hand with attempts to limit citizen privacy and increase mass surveillance. For example, Americans fear that the new administration might “erode cyber privacy,” and UK now has an unprecedented surveillance law that allows for mass hacking, among other things - which could lead to massive data breaches.
Is it still possible to stay private online?
The good news is that even though C.I.A. can access and tinker with people’s devices, encryption is out of reach even for government spies. It is highly recommended to use secure privacy tools, such as VPNs, which help hide the user’s true location (IP address) and encrypt all the information that is being transferred through the Internet. Such a user becomes impossible to track. VPNs helps anonymize browsing the Internet with its modern security protocols and no logs policy.
WhatsApp, Signal and Telegram still remain encrypted communication apps, and for safe emailing there are such encrypted email service providers as ProtonMail.
It is likely that C.I.A. will not change its hacking policies, and that everyone’s privacy will be even more challenged in the future. The only solution for private citizens seems to be taking their online privacy into their own hands. NordVPN (a VPN solution provider) believes that by taking the right precautions, people can still guard their privacy online. In addition to using encryption and safe communication apps, Internet users need to be careful not to click on strange emailed links, not to download from unofficial app marketplaces, to always have strong passwords, and to be generally cautious when sharing information online.
Learn the best ways to organize your app development projects, and keep code straight, clients happy, and breathe a easier through launches.
Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.
How to create a profitable, sustainable business developing and marketing mobile apps.