Joke Collection Website - Public benefit messages - How to prevent mobile phones from being monitored?

How to prevent mobile phones from being monitored?

How to prevent mobile phones from being eavesdropped?

Is the mobile phone that you carry with you every day always betraying users? How do private calls "spread"? There are five basic ways to eavesdrop on mobile phones.

Samsung i9500 quad-core

First, micro bugs

Installing a micro-bug in a mobile phone is the oldest thief's ear. Because the fixed telephone transmits an analog signal during the call, there is no encryption measure. If this signal is stolen, it can be easily restored to voice. Cell phone signals are sent into the air and the transmitted signals are encrypted. It takes some thinking to decipher them. But even so, mobile phone eavesdropping is still happening unscrupulously. For example, installing a micro-bug in a mobile phone is the most primitive and old-fashioned eavesdropping method. But when you open the back cover of the mobile phone, the parts in the mobile phone are arranged very tightly. Where is the gap for installing bugs? For example, the battery of a mobile phone can only be half its original size, so there is enough space. However, the transmission distance of this eavesdropping method is mostly about tens of meters, which means that if you want to monitor mobile phone calls, you must be within a certain range, and then it will fail.

Anti-eavesdropping method: don't let strangers near your mobile phone.

If the mobile phone is equipped with a micro-bug, it is generally not easy to find it. Therefore, it is suggested that when buying and repairing mobile phones, it is best to go to regular professional stores, and it is best not to lend them to strangers. Also, you should pay attention to the mobile phone given by others. Maybe it's a "modified" mobile phone. In addition, just like anti-eavesdropping in movies, if there is a very confidential phone call, it is highly suspected that someone is eavesdropping. You might as well learn the plot of the movie to make noise. Because bugs are all the same, they are very sensitive to noise. There is a lot of noise around, and the eavesdropping effect is greatly affected.

Samsung i9500 quad-core

Second, the pseudo base station

The GSM interceptor is actually a pseudo base station. People tens of thousands of miles apart can talk on their mobile phones and rely on nearby base stations. On the one hand, the base station receives signals, on the other hand, it is responsible for transmitting signals and acts as a "bridge" between callers. This pseudo base station does not transmit signals, but only receives signals. Pseudo base stations vary in size. A smaller pseudo base station is similar to a computer host, but it can receive all communication signals around it. Despite receiving so many signals, this interceptor can intelligently identify and find the mobile phone to be eavesdropped. The secret is that the pseudo base station can obtain the IMSI number of every mobile phone in the air. The IMSI number is unique just like the "ID number" of a mobile phone. After the pseudo base station obtains this number, all signals sent by this mobile phone are intercepted.

Anti-eavesdropping method: the shutdown state is basically safe.

Under normal circumstances, the mobile phone will enter a safe state when it is actually turned off. It will be safer if you unplug the battery again, because no chip will work without power, and mobile phones are no exception. Of course, this is not absolute. If the mobile phone has been "modified" and there is a rechargeable battery in it, it is likely to be monitored. In order to prevent eavesdropping, another trick is to turn off the mobile phone and put it in a closed metal box.

Samsung i9500 quad-core

Third, undercover software.

Mobile phone "undercover software" is no longer a legend. This software is also called mobile phone spyware. Once the mobile phone is "recruited", there is no privacy at all. Mobile phone hackers are more terrible than pseudo base stations, and they are almost everywhere. Cell phone virus is a program. If you use your mobile phone to surf the Internet, it is easy to get poisoned. The poisoned mobile phone is very "crazy", which will cause the illusion that the mobile phone is turned off, making the mobile phone black screen and the keyboard invalid. Poisoned mobile phones can also be turned on automatically, exposing all the information of the environment where the mobile phone is located. After poisoning, the mobile phone will not only automatically turn on and off, but also be used to automatically send messages to others, automatically make calls, automatically surf the Internet, and even destroy the SIM card chip. Some unscrupulous merchants use mobile phone viruses to send advertising information and spam messages to others through mobile phones with viruses. If a poisoned mobile phone is connected to a computer, even the computer will be "infected". If you connect to a landline, the landline will "betray" you.

Anti-eavesdropping method: You might as well use anti-virus software.

Poisoned mobile phones can be overcome by antivirus software. However, anti-virus software always can't keep up with the speed of new viruses. At the current level, once a mobile phone is infected with a virus, you can apply to the operator for mobile phone security value-added services, or you can change to a new mobile phone. Experts remind people who like to use mobile phones to surf the Internet. If there is nothing important, try not to use mobile phones to surf the Internet. "The longer you use your mobile phone to surf the Internet, the greater the risk of poisoning." Also, don't turn on Bluetooth and infrared at will, and don't download software of unknown origin at will.

Samsung i9500 quad-core

Iv. copy of SIM card

If the SIM card is copied, it will steal the privacy of the mobile phone quietly. On the Internet, the mass short message "You can copy the SIM card of your mobile phone to eavesdrop on anyone's phone without the mother card" suddenly found a "free ride". In the case of the mother card, it is very easy to copy the SIM card, similar to copying other files. Anyone can do it as long as there is machinery and equipment. However, in the absence of the mother card, it is actually quite difficult to copy the SIM card. Knowing the encryption and decryption methods of data such as SIM card and international authentication code, it is very unlikely to use high technology to enter the operator system. These sold online can be copied without a mother card, which should be deceptive. Of course, it is not excluded that some people will illegally use high technology to enter the operator system, so mobile phone users must be optimistic about their SIM cards.

Anti-eavesdropping method: report the loss as soon as possible after losing the SIM card.

Under normal circumstances, in order to prevent the SIM card from being copied, as long as the mobile phone user keeps his SIM card and password, it is impossible for criminals to clone the mobile phone card out of thin air. Once the user loses the SIM card, he should report the loss immediately.

Samsung i9500 quad-core

Five, more people open Bluetooth.

& lt