GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
The New York Times reports on how the Lebanese security services got persons to turn their smart phones into spyboxes by tricking users into installing dodgy messaging apps.
The researchers found what they said was evidence that Lebanon’s intelligence agency — called General Directorate of General Security, or GDGS — spied on their targets’ Android mobile devices and desktop computers using various methods for more than six years. Their primary attack method, researchers said, was through a series of decoy Android apps designed to look like widely used private, secure messaging services such as WhatsApp and Signal.
Once downloaded, the apps allowed spies to steal nearly everything off their victims’ phones, including text messages with one-time passcodes for accessing email and other services, as well as contact lists, call logs, browsing history, audio recordings and photos. The apps also let the spies take photos using the phone’s front or back camera, and turned the device into a silent microphone to capture audio. The apps were not designed to target Apple iPhone users.
Apple is better at checking and controlling who can publish apps on their platform, but it is still very-overdue for there to be tough laws, throughout the world, which define what may and may not be done with the Internet – especially, "the Internet of Things."
When the telephone came out, we introduced laws against "wiretapping" even as, for a time, we still had to have "party lines." We have created no such laws concerning the Internet – yet.
And there are some ambiguities. For example, the US HIPAA act defines "personally-identifiable health information," and proscribes draconian penalties for revealing it. And yet, phones capture your exact location, heartbeats and footsteps, and treat this as though it were nothing-at-all.
I just hope that "these Foolish Mortals" will act before some dastardly group of people demonstrates "What Fools These Mortals Be" by successfully perpetrating an unspeakable crime.
Distribution: Slackware/Salix while testing others
Posts: 1,718
Rep:
Smart phones are designed this way, its a feature. The camera and microphone were never for our convenience, that was just the marketing to get people to bite. The nature of the smartphone and laptops with same features is a spy device. Search the net for how Zuckerberg disables the microphone and camera on his devices etc....
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.