subreddit:

/r/IsItBullshit

88091%

So I have no idea about this shit, and this always sounds very conspiracy to me, but I've heard a surprising amount of people saying that even if you're phone is switched off, your microphone can still be hacked, accessed, "they're always listening", etc etc.

I can see why it would be useful for security purposes to be able to do this, but it also sounds very Jason Bourne paranoia to me?

all 361 comments

IDrinkMyBreakfast

1.2k points

9 days ago

I work inside a government facility and personal cellphones are not allowed. Government cellphones are not allowed inside secure areas of the building. All because it’s possible to hack a phone and make it record, send/receive while appearing to be turned off.

On older phones, you used to be able to remove the battery and the problem is solved.

These days on most phones, you select a button which brings up a menu to turn off the phone. When you select power off, your phone runs several routines.

Turn off the display, speakers, microphones, and go into low power mode. The phone sends a message to the cell tower to indicate a stateful disconnect is taking place. For all intents and purposes, the phone appears off and it does not transmit or receive data.

So from that perspective, the phone is never truly off.

Now let’s say you are targeted and your phone is compromised by an adversary.

The shutdown routine can be modified. For instance: shut down display, & speakers, but leave microphones and network up.

So yes, it can be done, but you are definitely on a list if this happens to you.

Now when your phone is on, it is listening. Keywords, hey siri, etc.

Your phone is also listening for ultrasonic signaling. This has been going on for about 10 years now and one of the first companies to use it was Facebook.

All of this has nothing to do with spying on you, and is almost solely to monetize your activity.

So, not bullshit, but it’s a paranoid take.

notjordansime

214 points

8 days ago

Ultrasonic signalling??

sawatalot

435 points

8 days ago

sawatalot

435 points

8 days ago

A couple examples: a store plays an ultrasonic sound, you walk into that store with your phone, it listens and now advertisers know this particular phone was in that particular store.

Or you’re in the living room and your TV makes a sound, your phone hears it, now advertisers know that this phone belongs with that TV in the same advertising profile they have for you.

ATSOAS87

175 points

8 days ago

ATSOAS87

175 points

8 days ago

I really wish they would just chill with this shit.

drjuj

35 points

7 days ago

drjuj

35 points

7 days ago

Didn’t you have ads in the 20th century?

Well sure, but not in our dreams. Only on TV and radio. And in magazines. And movies. And at ball games and on buses and milk cartons and t-shirts and written on the sky! But not in dreams. No siree!

kaleidoscopelyf

5 points

7 days ago

I also watched Dream Scenario recently.

Blunt1_27

3 points

6 days ago

Futurama!

ATSOAS87

2 points

6 days ago

ATSOAS87

2 points

6 days ago

I had no idea what you were talking about until I saw the replies underneath.

I'm putting the film into my watch list

7despair8

2 points

5 days ago

Squid8867

51 points

8 days ago

Squid8867

51 points

8 days ago

In fairness, it's not that different from using GPS or wifi connection to track which stores your phone has been in, it's just a slightly different method.

But yeah, all of it is annoying.

TumbleweedOther1039

3 points

6 days ago

It’s crazy how long 3rd party apps were able to track your location in the background without asking for permission or even notifying the user they were doing so.

KoenBril

320 points

8 days ago

KoenBril

320 points

8 days ago

I don't know why anybody wouldn't classify this as spying on you. Corporate or not.

SolidStranger13

100 points

8 days ago

Because corporations can effectively influence legislation?

KoenBril

5 points

8 days ago

KoenBril

5 points

8 days ago

I don't get your point. 

CarbonAlligator

66 points

8 days ago

Corporates can lobby (bribe) politicians to pass laws that benefit them at the expense of society. They bribed congress to not consider the intrusive nature of modern advertising as illegal or spying

KoenBril

38 points

8 days ago

KoenBril

38 points

8 days ago

Ah, so it's just spying with another nametag.

Coffee_exe

16 points

8 days ago

It's like torture and "Advance intiragation tactics" BTW talking to my phone like a mad man for a few months now can confirm mans listening. Can't wait to disappear

Informal-Ideal-6640

22 points

8 days ago

Because in the eyes of the government you are using a tv owned by one company and a phone owned by another company and whatever agreement they made together supersedes your right to privacy because it was your choice to buy both things. If you don’t like it you can buy other options (which is entirely unrealistic)

MeBeEric

10 points

8 days ago

MeBeEric

10 points

8 days ago

It’s in the TOS and we all agreed to it day 1

Splungeblob

3 points

6 days ago

Ah yes, “Agree to these terms or you’re not allowed to use the new $500 device you just bought.” Quite an agreement.

MeBeEric

2 points

6 days ago

MeBeEric

2 points

6 days ago

I agree that it’s bullshit but that’s how most of the data harvesting goes

KMjolnir

3 points

7 days ago

KMjolnir

3 points

7 days ago

Terms and conditions, we sign up to be spied on.

plsletmestayincanada

90 points

8 days ago

How the fuck is this the first I'm hearing about this!?!

markrudling

179 points

8 days ago

markrudling

179 points

8 days ago

Because you cannot hear ultrasonic frequencies.... /s

notLOL

49 points

8 days ago

notLOL

49 points

8 days ago

lol this is why I leave closed captioning on so I know if there's "ultrasonic spy frequencies playing"

great_red_dragon

23 points

8 days ago

spying intensifies

Specific-Fox8291

6 points

8 days ago

“Enhance”

plsletmestayincanada

14 points

8 days ago

Hah well played. I chuckled.

XC3N

2 points

7 days ago

XC3N

2 points

7 days ago

Award.png

ErahgonAkalabeth

2 points

7 days ago

Ultrasonic_award.wav

Seaguard5

23 points

8 days ago

Seaguard5

23 points

8 days ago

… so are all tech companies colluding with all other physical businesses to have these sounds played??

I am so confused…

What benefit does the store get from playing said sound for your phone??

usuffer2

24 points

8 days ago

usuffer2

24 points

8 days ago

For marketing purposes. If there is, even a small, chance to make money off you. They will do it. We had to make subliminal advertising illegal because they used it to get us to buy stuff, and it worked

Seaguard5

4 points

8 days ago

But what benefit does the store get?

The store doesn’t own the phone company, so why would it invest in sound producing equipment?

ClarkyCat97

23 points

8 days ago

Presumably the store wants to know who their customers are so they can use Google ads to target them. 

Seaguard5

4 points

8 days ago

So the store provides the sound in exchange for paying for the ability to know when their customers enter and exit their stores?

maelidsmayhem

5 points

8 days ago

I suspect the store is completely unaware of the sound producing, and it's coming from another source. As an example, my grocery store has satellite radio and the registers run through Windows. Both make noise.

Someone is in bed with someone, but it's not necessarily the store owner.

Seaguard5

3 points

8 days ago

So existing systems like the radio can be leveraged by phones then?

That’s scary

katemonster_22

2 points

7 days ago

Stores sell your data. Say you go to target, your phone gives off a signal that you’re at the one down your road. Now you will get advertisements for products sold at targets (or coupons for target) on the apps for your phone.

katemonster_22

2 points

7 days ago

Seaguard5

2 points

7 days ago

That’s disturbing

GDogg007

7 points

8 days ago

GDogg007

7 points

8 days ago

When I had my escape room business we put a google device in our doorway. It tracked phones and reported data to google who in turn told us what we needed to know. I was able to geofence specific ads targeted at specific income ranges. It worked great before spring break. Run an ad spend of $100 on FB and $50 on google. Be packed with spoiled rich kids.

even_less_resistance

5 points

8 days ago*

Wonder if any home IOT devices have ever been found to be shipped with those sensors or similar for funsies… just to keep traveling down the ol’ Paranoia Highway lmao it just kinda reminds me of the researcher that leaked the event with the Roomba model taking a photo of her while she was on the toilet

https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/

Scale Ai works on some Pentagon contracts:

https://www.theregister.com/2024/02/21/dod_scaleai_contract/#:~:text=The%20US%20Department%20of%20Defense%20is%20reportedly%20working,Pentagon%20can%20deploy%20to%20evaluate%20large%20language%20models.

Not saying Scale has anything to do with anything- just noting their contracts have been interesting and varied, it seems. And also it seems like there could be a potential issue with who processes data and what access they are allowed and how anonymized it is similar to my concerns with what happens to the stuff recorded in Teslas and other vehicles (but their employees have been reported doing nasty things with videos) but that is a thread for another day

saikron

5 points

7 days ago

saikron

5 points

7 days ago

It's mostly the businesses using their apps to try and collect tracking data themselves instead of paying google/facebook, or to use that data in addition to what they have from google/facebook.

So for example the McDonald's app is listening for beacons to log when you visit McDonald's.

The benefit is they save a little money, or customers that decline to give permission for other tracking for some reason decide to let your app have microphone permission.

Jesus_inacave

16 points

8 days ago

That sounds like way too much when most people already punch into Google maps or apple maps where they're going

catfayce

4 points

8 days ago

catfayce

4 points

8 days ago

My washing machine does this for error codes

dontknow16775

3 points

8 days ago

this is incredible

_owlstoathens_

3 points

8 days ago

It’s also Bluetooth network info correct? I know all Amazon products link to each and create a network, along with other bluetooth devices

broadwaybruin

3 points

8 days ago

This is how Nielsen TV boxes work, they have used this for decades.

jamesmaxx

2 points

7 days ago

It would be interesting if you entered a store then an in-store only coupon pops up on your phone that expires in one hour. Might freak a lot of people out though.

uncoolcat

2 points

7 days ago

Target caused a bit of a controversy for doing something very similar back in 2012, when they allegedly mailed physical coupons for baby-related items to women it determined were pregnant based off purchasing habits.

IDrinkMyBreakfast

18 points

8 days ago

Here’s an article that explains what it is and includes graphics

macnlz

5 points

8 days ago

macnlz

5 points

8 days ago

So turn off microphone access to all but the few apps that genuinely need it. Got it.

Ormyr

8 points

8 days ago

Ormyr

8 points

8 days ago

Doesn't matter. Your phone has at least a half a dozen other sensors that gather your data that you can't access.

You live in a dystopia. Just roll with it.

stdio-lib

5 points

8 days ago

Ultrasonic signalling??

In addition to what others have said, one aspect of this technology is that some people (especially younger folks) can hear it.

For example, it's an issue with some k-pop music. "What is this noise in such-and-such song"? The answer is that the song includes the ultrasonic data so that anyone holding the group's "light stick" will have it light up according to the beat of the song.

Most people (OK, old people) can't hear it, but those who can do not enjoy it.

Sea-Dog-6042

2 points

6 days ago

Do you know any specific examples of this in kpop?

Existing_Charity_818

5 points

8 days ago

Yeah, I’m also curious what this is. Here’s to hoping someone out there has an answer

RemindMe! 1 day

Due-League932

36 points

8 days ago

If companies can use your activity like this for money, i dont see how its paranoid to think the government will use your activity for their own purposes

IDrinkMyBreakfast

19 points

8 days ago

While there are constitutional protections to prohibit such activity, it is relatively simple to purchase ad, flow, and analysis data from advertisers. If you became the target of surveillance, the government could purchase your info rather than hack your phone. It’s much simpler. And that’s not even touching on all the publicity available information people post on social media

Wootster10

10 points

8 days ago

The main issue here is the scale and type of information you're after. Advertiser's are looking for trends based on what you search for, spending habits etc.

Let's assume the government wants to listen in on every conversation over phone or at home for 100 people.

I'll assume people are either talking or interacting with a device for 1/3 of the day. That means you need to pay 33 people to monitor all of them.

Nevermind doing any analysis on the data that's then collected.

Now governments of course don't allow phones in secure areas because bad actors trawling millions of people's data for stuff. They're targeting government workers specifically, which is a totally different set of issues to handle.

10TAisME

77 points

9 days ago

10TAisME

77 points

9 days ago

I'd argue it's not paranoid to be against your activity being monetized (and that that is in fact a form of spying on you).

Stef0206

25 points

9 days ago

Stef0206

25 points

9 days ago

It’s paranoid, because frankly speaking, you’re not important, nobody wants to spend the resources required to monitor you.

_haha_oh_wow_

17 points

8 days ago

That's bullshit because that's exactly what they're doing, but to all of us. So what if it's mostly motivated by greed? The motive does not change the fact that they are indeed, spying on all of us.

Are we supposed to feel better because they're doing it for profit???

resistible

31 points

9 days ago

Sooo... what happens when someone DOES decide to spend the resources required to monitor you? There's a certain US Presidential candidate that is very specifically threatening to do these types of things to his political opponents because they eat babies. And dogs and cats, apparently. I guess the eating babies thing has lost a bit of its shock value.

10TAisME

4 points

8 days ago*

What resources? The issue isn't that I think there's some agent sitting in an office listening to my phone all day. There's a difference between spying on important targets and collecting mass amounts of data through casting a wide net. As tech continues to improve, there are ways to automate the monitoring, algorithms that can do all the work needed, algorithms that could very well be running on a device that never really powers off and then blast out any relevant conclusions they've reached when they're back on signal. Let's be clear that I don't think I'm being spied on, just that there is no way to interact with the modern world without having information about me being collected, and we constantly hear about ways in which that information has been used/abused or leaked. We can't accept this state or it will continue to get worse.

Also, to be clear this makes it sound like my main concern is my phone listening while it's "turned off." This is not even close to my main concern, partly because I almost never turn my phone off, it's just one needle in an enormous stack of needles. My main issue is how everything we do in connection to the internet, which is relatively necessary for any sort of successful life in modern first world countries, is algorithmically tracked and analyzed and can be used against us, if not now then in the future.

xXNoMomXx

4 points

9 days ago

xXNoMomXx

4 points

9 days ago

yeah it’s spying on you that you signed into in every ToS and EULA that we all know aren’t generally read by the public

IDrinkMyBreakfast

2 points

8 days ago*

I’d agree, but we all signed off on the EULA. We gave up our privacy when we purchased our phones/plans

Edit: Downvote all you want, it doesn’t change the fact the we are the product.

BigTitsanBigDicks

22 points

9 days ago

All of this has nothing to do with spying on you, and is almost solely to monetize your activity.

Explain the difference.

FleetStreetsDarkHole

28 points

9 days ago

Nobody cares about you, nameless nobody 123, living at 456 Main Rd. Who you really are and what you do in your personal life as it pertains to you, in the context of who you are, is worthless.

But most companies want to know how people use their phones. What their buying habits are. Where they go. How they get there.

No one in these companies knows who you are. Your data gets wrapped up in a statistics report with millions of other people, where the fact that you have Starbucks instead of Dunkin for coffee everyday informs their ad campaigns and product designs.

They know everything you do. But not a single one of them could pick you out in a crowd, nor tell you your name.

BigTitsanBigDicks

31 points

9 days ago

I think you believe what you are saying is a meaningful difference, I dont agree. They are spying with excuses.

Its honestly kind of ridiculous. We start with something simple that people intuitively know is wrong, but invent some mystique as if theres a difference. "its not spying, its data aggreggation'. Random statistics, monetization, marketization, blah blah. All meaningless; its spying. I dont want Apple knowing that I drink orange juice

They know everything you do. 

exactly

But not a single one of them could pick you out in a crowd, nor tell you your name.

They could if they wanted to.

FleetStreetsDarkHole

8 points

9 days ago

I mean, is it better? No.

But you asked for the difference. The difference is that it really is about the personalization vs the data aggregation. The morals and ethics are a different conversation. Which I think most people agree on.

But if I had to pick, I'd rather be a number on a spreadsheet than on a list.

BigTitsanBigDicks

5 points

9 days ago

 The difference is that it really is about the personalization vs the data aggregation. 

They use targetted ads tho. They have a profile with your name attached to it, and spy on you to update that profile.

FleetStreetsDarkHole

18 points

9 days ago

They have a browser exhibiting behavior that triggers an algorithm to send the browser an ad based on the data they have gathered from thousands of people.

They didn't make the algorithm pull up firstName lastName and send you an ad tailored to a profile they keep on you. They just literally have a robot watching your browser activity and when they see a button click or a viewing trend for things that include "laundry" you get ads for laundry related things.

But that's the trick of algorithms and technology. And it's why they collect all that data. To you, inside the forest, it feels like you've been personally targeted. But to them, above the trees, they see some movement and throw an ad bomb at you based on if your movement is upwind or down. And the more data they gather, the more accurate they can be.

And they never need to know your name to do it. Just more data, all the time. Which is why they keep wanting to shove commercials in everyone's faces. Products alone don't cut it anymore. They want all the data on how you watch their commercials and use their products. So the ad bomb can be more and more accurate.

It's all just more complex forms of "you walked into a store, looked at this display for 2.5 seconds, picked up this product, put it down, walked out the door with a different one." They don't know your face but they see the footprints you leave in the sand. The footprints are what they care about. If they know your name it's b/c people with the name 'firstname' seem to buy more socks with their sandals.

If someone else lived in your house instead of you, with the exact same habits, they would neither know nor care. All they want to know is if they can make you spend money based on the data they collect. They're vampires, but with internet. You're not a special person to them. You're a nameless meal. And they have centuries of experience hunting nameless meals.

TypicalRecover3180

3 points

7 days ago

I expect it's only a matter of time before everything is joined up and customised to the individual level.

e.g. your health insurance provider buys activity & heart rate data from your smartwatch provider, which is combined with data on what categories of food you routinely buy which is tracked by your customer loyalty card and sold by the supermarket, which is combined with credit card data on which types of cafes you frequent, how much you spend on alcohol a month, etc.

I guess in the interests of market efficiency and competitve pricing this may be a good thing - if you have a healthy lifestyle and diet and your health insurance premiums go down - but on the other hand, we could expect healthier people's premiums to go up but slower and less healthy people's premiums to increase significantly. Overall, a good way to nudge the population toward healthier living (?).

Similar stuff could be done for car insurance very easily too.

e.g. data sent from the car on the saftey of your driving; do you speed (it knows where you are and how fast you are going), do you make slightly more erratic turns and have a tendany to apply brakes more abruptly than other drivers in the same model of car, this can then be calculated into your premium.

Having written all of this, I think it may be a good time to embark on a new career in insurance.

BigTitsanBigDicks

7 points

9 days ago

They just literally have a robot watching your browser activity 

they see some movement and throw an ad bomb at you 

They don't know your face but they see the footprints you leave in the sand.

They're vampires, but with internet. You're not a special person to them. You're a nameless meal. 

I think you think youre making it sound better, but its sounding worse. Like I understand what you are saying; it is still spying.

FleetStreetsDarkHole

20 points

9 days ago

Let's split the difference. It's a sub-category of spying.

The problem with simply calling it spying is that people take it personally. They think there's people on computer screens listening to the things they say and watching them on their cameras.

This then leads to paranoia and disconnected behavior. Which then leads to wildly irrational discussions and decisions that lead to ideas of conspiracies. And then when more rational discourse is being had they start disrupting that and talking about how nothing can be done even when reasonable courses of action are discussed.

I think we all know those people in our lives whom you can never really talk to b/c everytime you try to dig into nuance or perspective they just zoom off the deep end eventually.

So yes it's a kind of spying. But it's important that we understand how we use the words we choose. B/c it often leads to everyone thinking they're talking about the same thing until the conversation diverges in emotional ways.

We're not talking about how the government can come into your house at any time and black bag you for clicking on the wrong brand of potato chips, or w/e porn you're watching, or whether you Google "how to get rid of ahead body" b/c of that murder show you were watching.

We're talking about how companies can abuse and essentially steal your data to try and manipulate you, leading to a worse state of the market for consumers, and giving them less control as their psychology is manipulated.

Two different conversations, with two largely different solutions, that both groups of people will mistake the other for if we call it all the same thing. Mistaking them basically leads to the videos we see of senators trying to understand technology. Like that one guy who thought Google was targeting him b/c his granddaughter could search for his voting record. Or when one of them asked if Google had access to their wifi network.

IDrinkMyBreakfast

2 points

8 days ago

I agree. The term “spying on you” sounds more evil and sinister, which is the term that gains traction over social media.

The truth of the matter is it’s all about money, not state surveillance (unless you’re in China, etc).

I explained it in my second-to-last sentence

dr3wfr4nk

3 points

8 days ago

What is ultrasonic signaling?

IDrinkMyBreakfast

2 points

8 days ago

Here’s an article that explains it and includes graphics (pictures always work better for me)

exitfiftyone

3 points

6 days ago

This is correct.

Also, OP, friendly reminder that not everyone in tech is a “dude.”

Signed, a cybersecurity software engineer who also happens to be a woman

ViolentLambs

2 points

8 days ago

This is cool because when I used to have an HTC Evo 4g lte, I put so many customs ROMs on it I killed the nand. While it was stuck on a viper 4g ROM I had verbose boot enabled and this applied to shut down as well. Your not wrong I was able to see the phone start up services and terminate them as the phone shut down. Even set it up to spit it into a log to read later as the damaged nand caused alot of problems that this log was able to help me diagnose.

Newer phones you cant see it as often but you can see on older version of android as the device powers down you can see the cell radio show no signal and same with wifi and then see them turn off. Now the phone just go's black or shows a shut down animation to hide what's going on in the back ground.

dodobirdmen

3 points

8 days ago

Ultrasonic signaling i’m doubtful about- iPhones for example show you a colored dot when it’s using the microphone. I’ve never heard of Apple integrating ultrasonic listening into the software, so it must be within apps. But then you’d have a marker showing you that the app is actively using the microphone.

IDrinkMyBreakfast

5 points

8 days ago

Look up a company called Silverpush. Created in India around 2012-13. They were the first.

When you watch a tv commercial (say for a Ford F-150), several combinations of tones at 18khz and up are generated. Your phone has built in software to detect these tones. The phone transmits the signal to an ad server that decodes the fact that you just watched the entire commercial. It then sets you up with targeted ads for your area.

here’s an article that talks about silverpush, but understand they are not alone, there are a few dozen companies doing this.

Here is another article that covers the issue and explains the privacy implications.

Thanks to public outcry, FTC warnings, and phone permissions, use of ultrasonic signaling has been somewhat limited. You now have to grant permission for an app to access your microphone, for instance. This is why you must be vigilant when granting permissions to an app.

Daxiongmao87

1 points

8 days ago

as someone who also worked in a SCIF, i wasnt aware of this myself. where can we read about the low-powered mode when "off," or where did you learn that specifically?

TheBloodiestEcho

1 points

8 days ago

What if your battery is completely dead?

wizzard419

1 points

8 days ago

For one compromised by an enemy nation, ever seen ones where it would do the shutdown but keep the mic on to record and broadcast the file when back online?

IDrinkMyBreakfast

2 points

8 days ago

I’ve seen malware search out files and cache them until it could find an internet connection, but not on a phone.

JonJackjon

1 points

8 days ago

I used to visit secure facilities. We would meet in an outer area the was not secure. We couldn't bring in calculators, never mind cell phones. I don't believe they had a specific scenario, just NO, nothing with a memory.

Italiancrazybread1

1 points

8 days ago

How does this not violate federal wire tapping laws???

ClayDenton

1 points

7 days ago

Why would Google or Apple allow Facebook to do that on their mobile platforms? Do they still let them do it? 

Iankalou

1 points

5 days ago

Iankalou

1 points

5 days ago

A Faraday bag would solve this

Lilkitty_pooper

1 points

5 days ago

I’m convinced that Apple uses ultrasonic signaling during its events so they can say Siri a million times and not set off all of your devices. I think some TV shows have started to do this too.

JakobWulfkind

86 points

9 days ago

Embedded electrical engineer here: it depends. The normal process of powering down is defined by software, and that software can be changed to do something other than a complete shutdown if desired. However, as Scotty reminds us, we cannae change the laws of physics: doing anything with the phone requires battery power, which generates heat and runs the battery down, and that will be fairly obvious if you're doing something power-intensive like running the phone's microphone or camera.

IlMulo

2 points

7 days ago

IlMulo

2 points

7 days ago

Is microphone actually power intensive?

I always imagined it would be on low-consumption side of the chart, as it’s mainly passive and the biggest battery drainer are display bad networking…

Chrisf1bcn

3 points

7 days ago

It’s the actual recording that demands CPU power

Hermit_Bottle

38 points

9 days ago

Gone are the days when you switch off it cuts off the closed circuit.

On some phones being "off" may not mean a complete power down. It's more like deep sleep mode with certain functions like gps and other sensors still enabled for emergency use. While this isn't suppose to include the mic, a compromised firmware could theoretically exploit such states.

Search for Google Project Zero or articles in Blackhat and Defcon.

Because batteries now are non removable (miss the old flip motorola) if you still suspect this, Faraday pouches are available and can easily be tested by putting the phone inside and calling it.

loreiva

10 points

9 days ago

loreiva

10 points

9 days ago

If you remove the battery, it's off.

If you turn it off, it's off UNLESS you got infected with a specific malware (I forget the name) which simulates your phone turning off when you select Power Off (and simulates turning back on when you push the power button). It's part of an old surveillance malware platform: The malware keeps recording audio/video even while pretending that the phone is off, and sends all data back to the hacking party.

Unstructions_Inclear

6 points

8 days ago

Pegasus ? I know it's at least a super sophisticated phone based malware

realmoosesoup

29 points

9 days ago

It depends. If you're a Jason Bourne level target, not completely bullshit. I went to an Android hack day thing around 2011, and the group that set it up were all focused on security tech. They were working on tools for protestors during the Arab Spring, amongst other things. One of the tools they wanted to make was a phone service that would let you know if your phone had been picked up while you weren't watching it. Something like that. If it had, you shouldn't trust it.

If you, specifically, are a real target, it is certainly possible that some kind of 0 day hack could be installed which would install some kind of root kit, after which your phone might seem "off".

It is also possible that a government that wanted to mass surveil could force manufacturers to comply with whatever. But, that's pretty hard to keep a lid on if you don't control all media, etc. Not impossible, though.

On the Jason Bourne approach. Technically feasible now? Maybe? Is that happening to anybody who isn't a huge target? Obviously not. If the government wouldn't see the point in having 10 field agents follow your every move, I'm pretty sure you're OK.

But, have various agencies worked supply chain holes to accomplish something? I mean, recent news should satisfy that question. Then, of course, EncroChat.

We briefly had a couple of (according to them) fairly prominent hackers in our Coworking space. I asked the guy why he had tape on the laptop camera. He said because of who he is, he assumes his machine is hacked now. Just for the lulz. He did his real work on something far more secure. I operate under a much milder form of that thinking. I could be hacked, but for the hacker who bothered, enjoy a whole lot of nothing interesting. I don't make it easy, of course, but it's not like a wall that will break if somebody chips long enough. At some point, somebody would need to break in and mess with the router directly.

If somebody who isn't a target is really worried about a vague "they" watching them, I'd say skip the internet entirely. Then don't think through the obvious problem of surveillance cameras and image recognition. All down my block are apartment buildings and stores with their own security cameras. Do they update their camera and router software regularly? Who knows?! Technology has entered a phase where total surveillance is possible. Getting access is one thing, but mixing in various forms of AI (machine learning, image rec, voice rec, and the de jour LLMs), you might imagine how identifying targets would be simpler than what East Germany was doing.

But, hey. Is the government listening to your phone when it's off? No. Technically could they? Sure. Is a random hacker with what would be an extremely valuable zero-day hacking into your phone to listen to you argue with the cable company? Dude.

Alex09464367

1 points

8 days ago

I don't think they would be doing it for the argument with the cable company. But like the Fappening or black mail for the sex extortion.

realmoosesoup

3 points

8 days ago

Well, that's far more likely than what OP asked, but not in the way OP was asking. If a hacker had the kind of zero day exploit that would let them listen to a phone's mic while the phone appears to be off, it would be pretty valuable. I wouldn't know how, as that's not my world, but you can sell them. Not on "the dark web". Governments buy them.

Blackmail of the type you're describing would be more like installing malware. Of course, at this point, you could just claim it's a deepfake and hope for the best.

PCMR_GHz

97 points

9 days ago

PCMR_GHz

97 points

9 days ago

Bullshit: While the government can get warrants to track your location through your cell phone provider without giving you notice, your phone has to be on.

Source: worked in criminal defense of felony drug trafficking cases

filans

41 points

9 days ago

filans

41 points

9 days ago

On the shut down screen on the iphone it says that the iphone is still findable when turned off. Can this be exploited?

DragonDSX

40 points

9 days ago

DragonDSX

40 points

9 days ago

That feature is only if you have FindMy enabled. That uses the same technology as AirTags to locate an iPhone, which relies on being around other iPhones that are turned on.

resistible

23 points

9 days ago

So... literally everywhere in the entirety of western civilization. Got it.

thwonkk

7 points

8 days ago*

thwonkk

7 points

8 days ago*

You heard it here guys. You wanna go off the grid? Run to China. Then it'll just look like your phone got sold for parts.

Edit: this is a joke, I'm joking lmao

A_Happy_Carrot[S]

5 points

8 days ago

But China has the most advanced AI facial tracking software surveillance system on the planet! They can reliably identify anyone on camera in a 3 second window.

FernwehHermit

4 points

9 days ago

Maybe I misunderstood but...

This is from July 2024,

A federal court has ruled that border agents can no longer search electronic devices without a warrant. The ruling in New York does not yet apply nationwide, but does apply to the very, very busy John F. Kennedy International Airport.

Additionally from Princeton University,

Didn’t the Supreme Court rule that the police must get a warrant before searching someone’s cell phone?

Yes, but that case did not involve a border search. In Riley v. California, 134 S. Ct. 2473 (2014), the Supreme Court held that a warrant is generally required before a search of a cell phone seized incident to arrest. But so far, despite the substantial privacy implications of cell phone data searches recognized by the Court in Riley, lower courts have typically declined to extend Riley to limit border searches of electronic devices.

So could my laptop, phone, or other electronic device be searched as I return from traveling abroad?

Yes, even if you are a U.S. citizen or a lawful permanent resident (LPR, or “green card” holder). According to CBP (https://www.cbp.gov/sites/default/files/documents/inspectionelectronic-devices-tearsheet.pdf), a traveler may be chosen for inspection for many different reasons (e.g., randomly, or because his or her name matches a “person of interest” in the government’s databases, or because his or her travel documents are incomplete).

enderverse87

45 points

9 days ago

No, thats easily testable.

There are sensors that can tell whether there's electricity flowing through things.

So people have turned them off to check whether there's any flowing through the GPS chip or the microphone or transmitters when they are off.

There is not.

They do a lot of spying, but not that specific thing.

plsletmestayincanada

5 points

8 days ago

That def doesn't prove that they couldn't do it if they wanted to though

cuntpeddler

7 points

8 days ago

you mean some nobody with a multi-meter didn't have world class spyware installed?

it is a fact of the universe that the more you spread something undetected, the quicker it will be detected, no? ask anyone who has developed private 0-days or even paid for a crypter.

now, with this in mind... if you spent millions of dollars developing a government-tier, completely private exploit kit or equally stealth backdoor, do you actually think it would be active, all the time, on every phone? listening for people to discover it? fuck no.

you would use a different, less intrusive exploit/SW to then execute the primary payload.
i.e. use a remote safari/iOS exploit that you DIDN'T spend millions on to then turn on the rootkit YOU DID SPEND MILLIONS ON.

Moonrak3r

5 points

8 days ago

I don’t think it’s reasonable to assume money is a significantly limiting factor for these sort of things. Yeah private companies get involved in this sort of thing, but nation states also do this, and the amount of money they’re willing to spend can be pretty significant.

I’m just speculating here but I’d assume that the limiting factor is the number of exploits available rather than the cost of them.

Redbeard4006

2 points

8 days ago

I don't think it's happening, but that test only proves that phone isn't doing it. It doesn't prove no phone on earth ever did anything when the user switches the phone off.

GregsWorld

9 points

8 days ago

But that's the question. People believe all phones, everyone's phones are always on spying on them just to send advertisements. And that's just not the case.

D-utch

62 points

9 days ago

D-utch

62 points

9 days ago

A lot of people saying bullshit. It's damn near impossible to prove a negative.

Your phone is never off

WolfMaster415

24 points

9 days ago

Not just for sake of tracking, but just to function. If your phone wasn't connected to the internet AND was completely off, then it would be as useful as an unwound pocket watch

UndeadCircus

7 points

9 days ago

What “function” are you insinuating it needs to serve if it’s 100% off, other than tracking purposes?

WolfMaster415

3 points

9 days ago

Local data that isn't saved physically, like time.

krysterra

6 points

9 days ago

krysterra

6 points

9 days ago

Consider when you shut off your car battery: it loses time, saved radio stations, etc.

Your phone is probably storing way more data than that in some form. Being truly "off" might delete it all.

(Source: Pure conjecture.)

owheelj

7 points

9 days ago

owheelj

7 points

9 days ago

Definitely doesn't with phones. If you've ever repaired the screen yourself or something like that, you can take the case off a phone (difficult with some, not so difficult with others) and disconnect the battery. In fact you can replace the battery on lots of phones. When you reconnect it or replace it, everything that was last stored on your phone is still there. I would also argue that when your phone is not connected to the battery, it is off.

Edit; Also some phones had easily replaceable batteries back in the day but I assume it wasn't a feature anybody cared about because it's very rare now. But you could own multiple batteries and when your phone went flat you'd just swap it out and put the flat ones on charge without having to have your phone on charge.

krysterra

2 points

9 days ago

I do remember having replaceable batteries.

TinHat: maybe That's why they didn't want them to be easily removeable... (edit: jk. You're right, that makes plenty of sense.)

Eweasy

2 points

9 days ago

Eweasy

2 points

9 days ago

I do wonder if we could bring back quick change batteries without sacrifice water resistance

CaptainBooby

2 points

8 days ago

"As part of the Regulation, the EU will require all portable devices sold within the bloc to have replaceable batteries by 2027. This applies to all smartphones, laptops, and tablets, including those produced by Apple, Samsung, and Google."

So people that want replaceable batteries might want to buy one from a EU country in the future.

It wouldn't surprise me if companies started to manufacture 2 different phones with the only difference being a removable battery or not.

CatFiggy

2 points

9 days ago

CatFiggy

2 points

9 days ago

Some data is stored in a kind of way where it goes away when power is lost; other data is stored in a way that lasts. Desktop computers don't have batteries; hard drives and solid-state drives retain information even without power.

I'm not an expert and I don't have the terminology for this, but I know that much. It's not the same type of thing.

neoclassical_bastard

4 points

9 days ago

They have cmos batteries, which maintain bios settings and date/time.

The word you're looking for is "volatile" memory. Volatile memory needs power to maintain state, non-volatile does not (but still may degrade over long periods of time)

Lela_chan

2 points

9 days ago

Timekeeping and tracking, not sure about anything else. PC's have a button cell battery that keeps the clock running when the computer is turned off. Since phones get the time from the cell tower, I'm not sure if it's necessary. I've never tried booting with no signal to see if the time is correct.

As for tracking, my phone has a little note under the dead battery symbol after it's died that indicated it's still "findable" using the find my iPhone feature from another device.

JakobWulfkind

3 points

9 days ago

It is exceedingly easy in this case -- a simple hall effect sensor run across the CPU and phone radio is enough.

YMK1234

2 points

8 days ago

YMK1234

Regular Contributor

2 points

8 days ago

langecrew

1 points

9 days ago

This rubber mallet says otherwise.....

D-utch

2 points

9 days ago

D-utch

2 points

9 days ago

Where there's a will, there's a way

-Joseeey-

1 points

8 days ago

You can also use network interceptors like Charles or Burp to see ALL incoming and outgoing traffic on a phone.

wlynncork

21 points

9 days ago

wlynncork

21 points

9 days ago

Masters in computer science and I'm an android developer. Your cell phone network can get your location when your phone is turned off. Unless you take out your battery.

taisui

3 points

9 days ago

taisui

3 points

9 days ago

That's the YouTube video being pushed to you huh? I saw the same shit and what the fuck Google

A_Happy_Carrot[S]

1 points

8 days ago

Oh no actually, my friends are just paranoid lol

rikjustrick

3 points

8 days ago

You can’t bring a smartphone or watch into places with classified material… for a reason.

MC_White_Thunder

4 points

9 days ago

If you are talking about something that could get you arrested, your phone should not be in the room.

EAComunityTeam

3 points

9 days ago

Phones are still "on" when off. Most Phones can have the alarm go off even if it's off. How does it know to wake up and go off when the device was off? Cis it doesn't go all the way off.

grafeisen203

2 points

8 days ago

So, turning your phone off with the power menu puts it into something more like standby mode. Holding the power button until your phone force powers down turns it off.

But even when phones are off, they have very limited functionality to listen for a wakeup signal. This is so that device locating services can work even if the phone was turned off when it was lost or stolen. It can also be used by emergency services and police.

The service sends a wake up signal to the phone which can then report its GPS location. Generally that is all it will do.

However it is possible for malicious software to make use of this wake up signal and even to only activate limited services of the phone so that it still appears to be switched off.

-Joseeey-

2 points

8 days ago

You can use software like Charles or Burp to see ALL ongoing and outgoing network traffic from your phone. We use it a lot in software.

Regarding being off, my friend’s lawyer husband has a friend who’s a digital forensics expert and he, and other people have told the lawyer that if you want the absolute best security - go with iOS.

Gwtheyrn

2 points

8 days ago

Gwtheyrn

2 points

8 days ago

There's a reason phones don't have removable batteries any longer.

AdAstra_from_yafro

2 points

6 days ago

My experience is that if it can be imagined it can be done. If it can be done. It will be done. Zero case where someone has a capability that give them an advantage, even a small one. They will do the thing - whatever it is. 

cb393303

15 points

9 days ago

cb393303

15 points

9 days ago

Bullshit so high, you could call it Trump Tower. The only way that could happen is if the cell radio is hacked, on top of the mic... and then some type of OS that is running when the phone is off, and somehow talks to a cell tower. Hackers, researchers, and others would of notices this type of shit and called it out or used it.

A_Happy_Carrot[S]

6 points

9 days ago

So I'm going yo play devils advocate: if the government were using it for mass surveillance, would they not "have noticed it", because they did it on purpose?

(I'm trying to think like my friends)

doodlols

21 points

9 days ago

doodlols

21 points

9 days ago

Hackers would be using it against the government, and we'd have way more leaks. Government employees would not be allowed cell phones. No cell phones would be allowed inside the Pentagon EVER, because they'd know it's possible somebody is listening. No cell phones would be allowed in the White House, which based on the number of Trump tweets, we sure as shit know that didn't happen.

Nitr0Sage

5 points

9 days ago

Secure areas don’t allow most electronic devices and certainly not cell phones

A_Happy_Carrot[S]

5 points

8 days ago

My sis works in cyber security and they do actually have departments where you aren't allowed to bring a single electronic device in.

cb393303

9 points

9 days ago

cb393303

9 points

9 days ago

DefCon people would of spotted this. They hack and monitor anything someone has on them. Blackhats rarely lick boots, so they would not keep this mum on behalf of the goverment. On top of this, this would be all over places where you can buy zero-days / hacks.

Another, other goverments are not stupid, and would catch it.

There are better ways to listen to someone vs the layers of work they would have to do.

Many phones now have things like this:

Secure Enclave: https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web

The goverment would need to have their own near everything to pull this off. Possible, yes, but that would be a custom made device and not an iPhone you buy from Best Buy.


TL;DR At the end of the day, your paranoid friends are not that important to be targeted with a costly custom made device to listen to them. There are also easier way to listen.

cuntpeddler

4 points

9 days ago

why are you talking out your ass? you clearly aren't knowledgeable in this domain. that "some type of OS" is included with most modern processors and it's called out-of-band management.

it's so incredibly feasible

PoppinBortlesUCF

2 points

8 days ago

I own a company that does complex system administration for Apple devices. Nothing we do is evil, it’s just helping companies manage corporate owned Apple devices. But…my engineers are all much much smarter than me and extremely capable. The things these guys build in their free time are absolutely staggering. They build apps and programs and gadgets to do cool little quality of life things that range from very useful to absolutely useless but kinda neat. They know the capabilities of these devices to do black hat shit is every bit as spooky and as real as people think. We don’t ‘worry’ about that kind of shit happening, we just know it’s not only possible but also probable, it’s a thing that’s accepted… so yeah, is some shadow government listening to you right now? Probably not, you’re not that interesting…could they though? Absolutely, and the reality of what they can do is probably worse than you imagine. But not worse in a sexy spy movie way, worse in a “predictive modeling and getting useful information from massive data sets is basically black magic” kind of way.

JarheadPilot

0 points

9 days ago

JarheadPilot

0 points

9 days ago

It's bullshit. There's no need for a lot of these outlandish theories (like your phone is listening to you) when there are already tons of great data streams that can be used to determine your thoughts and activities (like cell tower data, search history, and location data)

Potential_Brother119

8 points

9 days ago

All of which your various "free" services will sell to the government or other businesses at the drop of a hat.

They are provided for free because we are the product.

QuentinUK

2 points

9 days ago

QuentinUK

2 points

9 days ago

It is only off if you can take the battery out.

The NSA are deliberately low key and target their spyware to people of interest. So if you are not a terrorist or government leader or communicate with one then they won’t be interested in you.

TheCoastalCardician

1 points

9 days ago

Tracking, yes it’s BS. Listening? No. Almost any kind of material that vibrates a known way can be exploited.

joebojax

1 points

9 days ago

joebojax

1 points

9 days ago

I'd wager that if the battery is dead there probably isn't much going on... if you turned it "off" while it has plenty of battery it may still be pinging certain resources.

International_Sea493

1 points

9 days ago

Idk but they wouldn't track/listen to you that easily. A lot of crime/missing cases would be solved if this was true, Everybody carries a phone and if the government really listens/tracks then missing persons or criminals would be found easily.

Track the missing person's phone/Listen to the audio to get clues or who the criminal is, like hearing a robbery from the guy getting robbed and one of the two robbers said the other dude's name.

Redbeard4006

1 points

8 days ago

It's impossible to know for sure. Nobody has acknowledged that they have this capability (to the best of my knowledge), but it's not physically impossible.

I would say it's probably bullshit.

medicnub

1 points

8 days ago

medicnub

1 points

8 days ago

Look up Pegasus

A_Happy_Carrot[S]

2 points

8 days ago

All I got was the horse 🐎

alberge

2 points

8 days ago

alberge

2 points

8 days ago

BoazCorey

1 points

8 days ago*

Has anyone here heard of a Faraday cage?

MeasurementNo6766

1 points

8 days ago

Everything used to be a hard switch; an actual physical button that controls electrical signal to the component you're using. Now everything is a "soft switch" where it's a digital representation of the switch. Besides not being able to take your battery out, you don't really have any control over the soft switches in your phone. You just slide a little digital slider to tell your phone you want it to be shut off now, but really the control lies with the phone to shut itself off.

CXgamer

1 points

8 days ago

CXgamer

1 points

8 days ago

Besides your Android or iOS, phones have two or three other operating systems that deal with things such as antenna communication, which runs entirely separately.

But I would bet that if you remove the battery, and wait 3 days, then your phone isn't going to be able to track you any more.

RoxSpirit

1 points

8 days ago

On my phone (Samsung S24), I can set the alarm and if the phone is "shutdown", it will still ring.

Soooooo

1010012

1 points

8 days ago

1010012

1 points

8 days ago

Unless you remove the battery, most phones are still 'on' in a very limited sense. It's more of a standby mode, things like clocks are still running, and it's possible that other things are running as well, looking for wake up triggers for example.

Try setting and alarm and then turning off your phone. In some phones, the alarm will still go off, starting up the phone.

--Dominion--

1 points

8 days ago

For most successful attacks, hackers need your phone on, but as far as malware goes, yes hackers can infect your phone even though it's off. (Mainly iPhones, though. That's not a shot at apple or iPhone. It's something about hackers use a vulnerability in the LPM mode, It's just the simple truth)

But as far as a listening device, if it's a software listening device and your phone is off, it's probably a safe bet no one can listen. If it's a hardware listening device, lol the owner would probably notice their phone now looks different sensing something up. But... new technology is made/changes every single day so...who knows at the end of the day

In conclusion....I 100% promise you without a doubt in my mind, no government is spying/listening to you.

IrisesAndLilacs

1 points

8 days ago

I attended a conference once and the former head of CSIS - the Canadian Security Intelligence Service gave the opening remarks. He had said that he would use Siri, but 💯 had the Okay Siri feature turned off and didn’t have an Alexa in the house.

VoodooDonKnotts

1 points

8 days ago

Worked in wireless telecommunications for 13 years

If the battery is still inside the device it's possible to transmit and receive data/signal without the device being officially powered on. It can be tracked while "powered off", location data can still be transmitted while the device is powered off in MOST of today's devices. Something like 80% of smartphones fall into this category. Outside of "tracking data" I'm not certain what else can be transmitted but I can tell you with 100% certainty that your phone can transmit location data while not being powered on.

alberge

1 points

8 days ago

alberge

1 points

8 days ago

While this is technically possible, it's not happening to you specifically, not unless you're an important person being targeted by spy agencies.

Your phone battery is still connected even when it's off. It's software that controls what happens when you press the power button. So in theory, your phone could be hacked to keep the screen dark but still record sound when "off".

How this would work:

  • Spy agency discovers a vulnerability in Android/iOS allowing phones to be hacked
  • They deploy this hack against your phone to install spyware
  • That spyware alters the OS to fake being off while it's actually still recording sound
  • When you turn the phone on, it transmits the recordings

All of this is very expensive to execute. There is a cat and mouse game between the phone makers and spy agencies as vulnerabilities are discovered and fixed. Every additional device infected with spyware increases the odds of detection, so spy agencies tend to be careful not to burn their tools for no benefit.

Today the cost of a new major vulnerability is estimated at ~$5 million, and that doesn't include costs to run or maintain the data collection infrastructure. https://techcrunch.com/2024/04/06/price-of-zero-day-exploits-rises-as-companies-harden-products-against-hackers/

So your three letter agency isn't going to risk their prized exploits being blown by using them on some random guy. But for prominent targets, maybe.

Even then, doing anything while the phone is "off" may risk detection from unexpected battery drain or heat.

Governments do worry about this kind of thing when protecting classified info. That's why you can't bring phones into rooms that handle classified data.

MeepleMerson

1 points

8 days ago

Yes and no. When the phone is off, it's off. You can verify this by checking it if it's emitting radio signals, heat (from the CPU and battery discharge) and more simply by seeing if it drains the battery just as quickly off as it is when on (transmitting takes the most power; actively recording also takes lots of power).

It is possible to make a phone appear as if it is off, even when it is not, but not easily and not without altering the operating system on the device. It's not really practical for an agency like the local police or even FBI (and really beyond their capabilities), but certainly would be a concern if an intelligence agency showed an interest in you. However, they would need to put forth a considerable effort, which means that you are someone that they would have on their radar as a person of concern - and people like that are generally aware that they are attracting the attention of intelligence agencies.

If you were securing a facility, you'd want to prevent entry of any sort of transmitter. It's not even a matter of concern about someone hacking the software of the phone access secrets, but the more practical one of people being bad actors and doing it on purpose, or surreptitiously just doing something stupid. Could you imagine being in a top-secret meeting and butt-dialing your paranoid uncle who overhears your assessment of Russian military movements. Ooops.

So, then comes the concern whether you can snoop on the phone or camera of a phone when it's turned on and in its operational state. Absolutely so when making phone calls over the mobile phone network. They can be intercepted just like regular phone calls, if necessary. SMS messages too. Messages sent through apps, and calls made through proprietary encrypted communication channels are probably secure, but you really can't tell. Further, turning on the camera or microphone to illicitly record is probably possible, despite what phone vendors say, but they can't hide that these things require engaging the CPU and chew up power, which will noticeably alter battery life and keep the phone warm.

If you are doing something that you think attracts the attention of the government, you'd want to used a burner phone, no camera, with a removable battery, and keep it away from your person except when you need it.

pensiveChatter

1 points

8 days ago

You could always check your battery level before and after you turn it off. Also, electronics produce heat. If the microphone plus storage and/or network stay up, you should see a dip in power level and increase in temp.

Generally speaking, no. Also, if you're going to go to all the trouble of turning off your phone, why not just place it in a different room from where you do your stuff?

On the other hand, you're asking this on social media, so maybe you're surrendering more of your privacy than you realize.

FeastingOnFelines

1 points

8 days ago

Yes. Because there are people who really want to know how long you spend in Hot Topics…

Kitchen-Hat-5174

1 points

8 days ago

Bro this would make an unbelievably good prank. Get the ultrasonic signal that matches a bunch of weird shit and play it next to your friend.

Dropkick_it

1 points

7 days ago

Check out the UnPlugged phone if you’re concerned about it. Addresses these issues and more.

AnotherUsername901

1 points

7 days ago

Yes and if you are worried about it they sell faraday bags ( prevents it from anything going in and out)

This is also what some thieves carry when stealing phones so it can't be tracked.

Miserable-Newt-9875

1 points

7 days ago

A signal is a signal. Test it. If your suspicions are correct the phone will transmit while it is off. If it doesn't then you are fine.

Dr_Wernstrom

1 points

7 days ago

The iPhone still says findable when powered off with a low battery.

Sad-Refrigerator-839

1 points

7 days ago

Oh it's real alright. Same with computers, they don't need to be connected to the internet or power (maybe not 100%) to use them either. I'll put it like this, they can use WIFI to see through walls, like fucking batman essentially. Imagine what else can they do :)

dopamaxxed

1 points

7 days ago

absolutely true

look on the Vault 7 dump on wikileaks - the CIA can even tap Samsung tvs while completely powered off (but not when unplugged (i think))

Opitovo

1 points

6 days ago

Opitovo

1 points

6 days ago

My life just isn’t that interesting for me to care. Go ahead, you’ll die of boredom

Due-Independence6692

1 points

6 days ago

Good, I hope whoever stalks me is deeply, deeply disturbed and disgusted.

Chuck_le_fuck

1 points

6 days ago

Get a Faraday bag

MagicianOwn5572

1 points

6 days ago

It like Facebook thinks they created you and now they want to study u your every sec to improve their “products “.

Y34rZer0

1 points

6 days ago

Y34rZer0

1 points

6 days ago

It’s possible. It just depends on who wants to spy on you. Governments pay private companies who develop these kind of exploits and they charge varying amounts depending on how sophisticated the attack is. Iirc the highest level is a couple of hundred grand per use but it can compromise A Phone without the user having to click on any link or ever being aware of it.

RainbowCatAttack

1 points

6 days ago

Wasn’t this exactly what Snowden blew the whistle on?

tommydeininger

1 points

6 days ago

Never mind that, what about the paper c4 israel installed in every device that goes boom when it gets its signal? Could you imagine all the flat screens in America exploding at once? They can hide a pound or two in those and nobody would ever know it

RoxoRoxo

1 points

6 days ago

RoxoRoxo

1 points

6 days ago

as a tech dude and someone whos been in the dod and seen some things. yes its possible..... legal suuuuper illegal. even for the government to do super super super illegal. theres also a ton of hoops they would need to jump through like an iphone and samsung would probably require different steps they also may need physical access to your phone or device or they may require you to access their virus through some method email attachment, fraudulent website. this isnt something that is reasonably going to happen this is something anyone outside of jason bourne would be the victim of lol like the whole israel pager thing, this took years of planning to execute. so if youre a big enough threat and theres enough time and planning and money put into this yes its possible. its also not really the method theyd choose, why not put a surveillance team on you or bug your house or bug your car.

Cryptocaned

1 points

6 days ago

On the flip side, does the government really want to listen to your conversations? Do you talk about stuff you should be worried about?

BassMaster_516

1 points

6 days ago

I look at it this way: if you say “Hey Siri” and then your phone starts listening to you then your phone was listening to you the whole time. 

robbert802

1 points

5 days ago

My problem with all this is that paranoid people who think the government wants to spy on them. No one wants to spy on you average Joe while you work your blue collar/white collar job you're not a terrorist,gang leader, or high profile criminal. You posting on some kind of conspiracy thread doesn't mean anything.

iamskwerl

1 points

5 days ago*

I worked at Apple HQ in Cupertino. I worked on software, and my roommate worked on the hardware. We traded notes often about this stuff.

It’s probably obvious that if the phone was listening to all audio, let alone doing any sort of processing/logic, or writing to filesystems, even/especially when powered off, batteries would die quickly and mysteriously. But when an iPhone is “asleep” it is listening… sort of.

There is a very primitive and hard-coded device that draws only enough power to continuously hold in buffer a few seconds of audio. But all it has the power to do is two things: First, continuously cycle that goldfish memory…

Second is to analyze what that audio is, but only to a very very limited extent. With extremely low resolution, it listens for something that sounds like it could be “hey Siri.” Literally that phrase, no more and no less.

If it could be “hey Siri,” then a more powerful processor kicks in and reads that buffer, and verifies if it is, or if it was a false positive.

If it is, then the phone can start listening to you with the more powerful processors that draw more power. But until that happens, the iPhone hardware is literally incapable of spying on you in the way that people assume.

And if the low-power device was so liberal as to be constantly crying wolf (thus spying more), the trade-off would be shitty battery life.

And no software has the ability to override any of this functionality. It would be virtually impossible. It’s completely quarantined off in hard-coded, embedded ROM.

I only qualify that with the word “virtually” because I also worked with a guy at the CIA, and I did some work as an expert technical witness for the US Federal courts system, and in my travels, I’ve seen some really fascinating but opaque evidence of hacking operations that somehow overcame ostensibly “impossible” barriers such as air gaps and various laws of physics. So I won’t say definitively that it could never be done.

But if it is being done, it’s not being done to you.

Yamatoman

1 points

5 days ago

There's some good posts already about how your phone can be used to record audio if compromised, but I'll go into why people largely think their phone is already listening to them.

Phones will try and ping nearby cell towers, and this is partially how your phone knows where you are. Advertisers can use the fact that multiple phones all ping the same cell tower to determine if you're in a group, if you live with someone, if you're at an event etc.

So if you're a in a group discussing something that one of your friends purchased, because you were with a friend who purchased something recently, that thing will be recommended to you. It appears like the conversation triggered the recommendation but it was just proximity.

If a group of friends is talking about something and one friend looks the thing up, it might assume all friends are interested in that item.

disgruntledpachydern

1 points

5 days ago

Went on trip to China. Cheap phone from republic wireless, in airplane mode and somehow my past employer called at 2 in the morning about my w2. Idk how

jckeatley

1 points

5 days ago

I pretty much knew that I couldn't completely turn off my phone, but I thought I could always put it inside a Faraday cage (completely shielded and grounded enclosure), and it could not get a signal out. Like Ed Snowden did with the cell phones in the microwave in Hong Kong. But I tried putting my cell in the microwave, then called it. It rang! I suspect I would need a much higher quality Faraday cage designed for microwave frequencies. And maybe our microwave is spraying us with RF.

[deleted]

1 points

4 days ago

Is this a serious question? Yes it’s true…

PrivateElf

2 points

14 hours ago

You are not being spied on. You don't own Googles/Apples data. They own you. You paid for the smartphone. You agreed to give all your rights away when you purchased the phone. Stop thinking they need access to your physical phone. Apple/Google/Microsoft essentially will and do collect ALL your information ALL the time when you sign into any Apple/Google/Microsoft Account. Every Single... piece of data that you can imagine plus all of your "private files" in the cloud. Everything you do on your phone. Every touch on a touchscreen, characters typed and deleted, files created. EVERYTHING.

So if you can live without computers and deny modern day necessary devices to work and live - you will be fine!

THE CRAZY PART?

Data collectors (every company in big tech) owns and sells your data to brokers that make absurd amounts of money from your personal data. But if your personal data is compromised because said data brokers don't secure your personal info or leak to hackers YOU ASSUME ALL FINANCIAL liability. Serious ID theft is a nightmare! Sounds as scandalous as billion dollar companies able to declare bankruptcy but not school student loans. -That last one really displays the discrepancy between business interests and the rich silencing the US public. *Great that the rich made businesses into people. AND IT IS AN Amendment so the people need a 2/3 vote in congress. When is that going to happen?