Joke Collection Website - Public benefit messages - I heard that charging treasure can see the information of mobile phone when it is connected to the computer. what do you think? It is said that take the line used for that mobile phone as an example.

I heard that charging treasure can see the information of mobile phone when it is connected to the computer. what do you think? It is said that take the line used for that mobile phone as an example.

Some charging treasures steal user information. Generally, the charging cable sent by the regular charging treasure only has the charging function, but does not contain the data function (which also saves the cost), so there will be no data worry. I wonder if it's modified.

Sina mobile news 65438+February 1 afternoon news, according to CCTV news reports, many modified charging treasures have the function of stealing user information. When users connect to charge, they will start copying personal privacy including photos and text messages in the background.

With the increasing popularity of integrated mobile phones, charging treasure has become one of the indispensable electronic products for many "thumbs", but the mobile power supply originally used to charge mobile phones can also become an "invisible killer" who secretly obtains your personal privacy.

As we can see from the video, this product, which is no different from ordinary charging treasure, can automatically start copying data after connecting the mobile phone. The charging treasure in the demonstration has an LED light. When the charging treasure starts stealing user data, the LED light starts flashing frequently.

The time to copy data depends on the amount of user data, which may take one hour if it is long and only ten minutes if it is short. The copied data includes all records of users' photos, videos and even text messages. Of course, if there is a document file stored in the mobile phone for the company, it will also be copied.

Coincidentally, in addition to the charging treasure that can copy data, it can also be transformed into a listening device. By modifying the internal structure of the charging treasure and adding GPS and call module, the monitoring and positioning functions of geographical location can be realized. This charging treasure has a built-in SIM card, and criminals can start monitoring and positioning by sending SMS instructions and other means to activate it.

Faced with so many disturbing factors, how should we guard against them?

First of all, try to choose the power supply mode of charging the mobile phone outside, that is, avoid using unknown charging stations with USB ports, because it is difficult for users to know whether such USB backend is connected with other devices.

Secondly, bring your own big brand mobile power supply, and don't charge your mobile phone with unknown equipment from strangers.

Finally, when the mobile phone connects to the storage device, there will usually be a prompt. For example, the iPhone will prompt whether to "trust" the device, but such a notice will not appear in the regular charging treasure. If found, please interrupt the charging connection in time. (Qi Xin)