Ask a Prepper
  • DIY |
  • Terms of Use |
  • Privacy Policy |
  • Contact
ask a prepper survival every day
No Result
View All Result
  • Home
  • All Articles
  • Editor’s Pick
  • Survival Knowledge
  • How To’s
  • Store
  • About Claude Davis
  • Home
  • All Articles
  • Editor’s Pick
  • Survival Knowledge
  • How To’s
  • Store
  • About Claude Davis
No Result
View All Result
Menu
Ask a Prepper
Search
No Result
View All Result
Print Friendly, PDF & Email
Home All Articles
A Simple Way to Block Your Cellphone from Being Spied On

A Simple Way to Block Your Cellphone from Being Spied On

KJ Barber by KJ Barber
May 26, 2017
20

Over the years, the number of cell phones has increased rapidly. In this age, almost everyone has a cell phone and, in particular, a smartphone. Phones have made life much easier, there is effective communication between people, and it has improved numerous lives including the growth of Tech billionaires and employment opportunities for many people.

Related: It’s High Time You Started Worrying: The Rich Are Becoming Preppers

We use our phones for almost everything from booking a flight or an Uber to purchasing different products in an online store for our use. But with every object, there is always a looming shadow besides it. By use of a phone a person can store his personal details in an account without going through the hustle of using a computer. Although this seems cool and perhaps efficient, it has some limitations because of the presence of online ‘vultures’ ready to pounce and feed on your details if your phone is unsecured.

The number of hackers has increased proportionally with the increase in the number of smartphones. All that a hacker requires can be your phone number to infiltrate your privacy and mess up your life. This has also increased the vulnerability of phones over the years.

We buy smartphones every other day, and the rate at which new models and features are released is quite high, but most of us never take the time to check if our phones are secured or not. A high percentage of people are always on their phones on the better part of the day. This makes it easier for hackers to target phones which also have minimal security compared to computers.

In the recent past, numerous cases of phone hacks had been recorded, and similar attacks carried out by NSO group (which disposes of surveillance software to snoop on people’s emails and messages) in the US had been reported.

Phone surveillance and hacking had been known as one of the main causes of security breaches in the country. To show how grave the matter is, Edward Snowden had to seek asylum in Russia for reporting on the massive surveillance of the government on its citizens. With these vulnerabilities, the question arises: how does one protect their phone from hacking and being monitored?

Ways to Protect your Phone

  • Buying well-secured smartphones

As prevention is better than cure, the first step in securing your phone is by purchasing a phone that is well protected from hackers. With the increased cases of phone surveillance and hacking, phone companies had to step up and include security design upgrades for their phones so that their customers may have some peace of mind.

Although this has been done, there are other phone companies who take minimal steps in securing their phones and leave this responsibility to the phone buyers as expressed in their terms of service. When looking for a new phone, it is not enough to only consider the quality of the camera, the screen size of the phone, the storage capacity and the battery capacity.

You first need to examine if the phone is secure from external attacks from hackers and the ease with which the phone can be monitored.

  • Installing phone security applications and software

All smartphones have online stores with millions of applications. Android phones have the Google Play store, Windows phones have the Microsoft store, and iPhone or Apple phones have the app store. You can secure your phone by searching in the stores for security apps.

The availability of many security apps enables you to specify on the type of security you require. Another advantage is that most of these apps are free so you don’t have to dig into your pockets for funds to be used on purchasing the apps. It is also advisable to install the apps from the official, well-known app stores of the smartphone platforms.

When you get a ‘security’ application from a third party, there are high chances that the app may be a virus or a gateway for hackers to gain access into your phone system. Also, when installing an app regardless of the category, it is advisable to read the permissions required by the application because some apps require permissions that make your phone vulnerable to attacks.

Some of the features of these security apps include protecting your phone platform from threats such as unsecured links, unsecured networks, malicious applications, and viruses.

  • Encrypt your phone data

This refers to the process of storing your phone data in a scrambled, unreadable form. By encrypting your phone, you can protect sensitive information contained in your phone. A hacker or any other person who wants to put you under surveillance will not be able to gain access to your data without your authorization or the encryption code to decrypt the data.

After encrypting your data, your phone can only be unlocked when you enter the phone’s password. Although the effect that comes with encryption is that your phone might have slightly lower performance because of the need to decrypt every time you want to access your data, it is one of the most efficient ways of keeping your phone secure, and the protection is worth it. The encryption settings can be easily accessed from your phone’s settings tab.

  • Update your operating system

No matter the type of operating system your phone is running, it is of great importance to always update the software. That’s because with every update there is an improvement of your phone’s security features and the developers work hard in closing any security loopholes that keep arising with every upgrade.

The vulnerability of your phone is reduced, and your phone becomes more secure. Also, by upgrading you can be in control by determining what type of permissions the applications you install will be able to access on your phone.

  • Not Rooting or Jailbreaking your device

The process of rooting or jailbreaking your device has always been considered as a way of gaining freedom for your device, but sometimes freedom comes at a price. If you are not an experienced user, the process can prove deadly to your phone’s security. It is like opening the lock and ushering in hackers for a cup of tea because it reduces the amount of time they would require to get access to your phone.

When you root your phone, you remove the available protection and trade it for added functionalities that may add nothing to your protection. Sometimes it’s better to have device limitations if it guarantees your phone’s security.

  • Backing up your phone’s data and set up remote wipe

It is of great importance to always have a backup of your data either by syncing your device files to an online account, cloud storage or by connecting your phone to your computer and moving your data to a PC to preserve your files. This should be done in case your phone falls into the wrong hands and the person decides to snoop over your data.

By enacting the remote wipe feature, you will be able to clear all data remotely. Hence, the person won’t have anything on you, and you can also determine the location of your phone in case you lose it. This makes your phone more secure and less vulnerable to surveillance and attack from hackers.

How to Test for Protection

There are various ways to test if your phone is protected from malware, hackers and surveillance but the best methods are:

  • Check if your phone behaves unlike the normal way. For example: when apps open without your consent, when the phone starts sending text messages or starting a phone call by itself then your phone might be compromised and there is need for you to seek for protection.
  • If you notice strange charges on your phone that you did not approve, then that may show that your phone is secure.
  • Another way is by running an antivirus app on your phone which may show if there is any malware available on your phone.

Whenever you feel like your phone is not secure, take the necessary step and secure it before it’s too late.

Conclusion

There is need for the government to be involved in securing the privacy of its citizens by enacting laws and policies to deal with hackers. Also, instead of carrying out surveillance on its citizens, they should discourage agencies and organizations that carry out surveillance and monitoring services. Above all, the process of securing your phone and your privacy begins with YOU!

You may also like:

emp map blackoutHow To Make A Tin Can Directional WiFi Antenna to Extend your Communication after an EMP

SHTF Antibiotics (True Story)(Video)

5 Things You Need to Do When There’ll Be No Rule of Law

Emergency Bag to Keep in Your Car in Case of an EMP

Tags: news
Print Friendly, PDF & Email
ShareTweetPin4

Comments 20

  1. Older prepper says:
    6 years ago

    How about don’t use your phone? I don’t have a cell. Just a thought. We lived without these things before.

    Did you like this comment? 11
    1
    Reply
    • TogetherWeStand says:
      6 years ago

      I miss those days. The microwaves used by these phones are very dangerous. I had a friend that worked for a cell company and he said that the microwaves are the cause of the bee hive populations dying off. He quit the company and refuses to have one. This person could help you understand what’s going on. https://www.google.com/amp/s/ascendingstarseed.wordpress.com/2013/10/27/barrie-trower-the-cooking-of-humanity/amp/

      Did you like this comment? 6
      Reply
      • RRRRRRRRRainbolt44RRRRainbolt44 says:
        9 months ago

        TogetherWeStand, this link is gone, “ascendingstarseed.wordpress.com is no longer available.
        This site has been archived or suspended for a violation of our Terms of Service.
        For more information and to contact us please read this support document”.

        Did you like this comment? 1
  2. Janeka says:
    6 years ago

    My $14.99 old as the hills no frills pay as you go flip phone works well.. Used for Emergency calls only.. the technology itself is so old the new wave hacker doesn’t use it..

    Did you like this comment? 11
    Reply
    • Older prepper says:
      6 years ago

      Janeka; Excellent! ☺

      Did you like this comment? 2
      Reply
    • LoveOneAnother says:
      6 years ago

      Stay away from the smart phones. The microwave exposure isn’t as bad with a flop phone. 4G going to 5G means much more exposure to microwaves.

      https://www.google.com/amp/s/ascendingstarseed.wordpress.com/2013/10/27/barrie-trower-the-cooking-of-humanity/amp/

      Did you like this comment? 5
      Reply
  3. Wannabe says:
    6 years ago

    Take said cell phone and place on hard surface such as concrete or asphalt. Grab a blunt object such as a hammer and commence beating the said cell phone into a thousand individual pieces and viola no more tracking device and or spying contraption.

    Did you like this comment? 4
    1
    Reply
    • Knowledge Is Power says:
      6 years ago

      Or exposure to the microwaves they expose a person to. 5G is coming. Stronger microwaves. Thinning the herd they are.

      https://www.google.com/amp/s/ascendingstarseed.wordpress.com/2013/10/27/barrie-trower-the-cooking-of-humanity/amp/

      Did you like this comment? 4
      Reply
      • joefinn67 says:
        9 months ago

        Right on

        Did you like this comment?
  4. Truth-N-Love says:
    6 years ago

    Cell phones work on MICROWAVES. 5G means stronger microwave signal. Who cares who is listening in on you if you going to die anyways.

    https://www.google.com/amp/s/ascendingstarseed.wordpress.com/2013/10/27/barrie-trower-the-cooking-of-humanity/amp/

    Did you like this comment? 3
    4
    Reply
  5. vocalpatriot says:
    6 years ago

    “..the developers work hard in closing any security loophole..”
    Except when they create ways for tptb to have unlimited access to your accounts, data, phone conversations, location, etc, etc, etc…ad infinitum.
    The hackers aren’t the real danger..the government that pays those hackers are.

    Did you like this comment? 7
    Reply
  6. Denese says:
    5 years ago

    It is bound that London, the capital and largest metropolitan area inside UK is additionally its largest urban zone.
    But, whenever a homeowner does not pay their assessments, it’s the management company’s responsibility to get those funds.
    Instead, do not forget that students are generally less fussy than other tenants,
    so as long as it is all totally clean and functional you do not need to spend a lot of money on making
    your premises in a luxury abode.

    Did you like this comment?
    Reply
    • rm p says:
      9 months ago

      Huh?

      Did you like this comment? 4
      Reply
  7. SaturdayPrepper says:
    5 years ago

    4G and 5G cell operate on the same frequency… last ive read. Yes it’s “microwave” about 1.8 or around 2ghz. But a cell phone transmits less power than almost all forms of push to talk radio. There won’t be more microwaves in the air, just a different signal modulation that allows more data to be transferred in the 1’s and 0’s. Better signal processing in the phones etc.

    Did you like this comment? 1
    3
    Reply
  8. Cat says:
    2 years ago

    I may be mistaken, but under the heading ‘how to test for protection’. Second dot. Should it be ‘ is NOT secure’?

    Did you like this comment? 1
    Reply
  9. crazysquirrel says:
    9 months ago

    EVERY smartphone has built in back doors that no security measures can stop nor detect.

    Towers to phone pings will show your exact location, path traveled, and what destination you are at and for how long.

    Go tot he bar and SOMEONE will know.
    Get a VD test/treatment and SOMEONE will know.

    Go to a political rally and certainly SOMEONE will know.

    And most of them never asked for your permission.

    6G is about to come out soon too.

    Oh remember that 6 foot spacing during covid?
    Tracking needs no closer than 6 feet from the nearest cell phone to track you properly.

    Did you like this comment? 4
    Reply
  10. joefinn67 says:
    9 months ago

    Duration of exposure is very different with a push to talk radio it is a sudden burst not a constant. Not to mention you’re not walking through push-to-talk soup all the time. With cell phones you are under constant pressure from the EMF on your body. Please, spend some time understanding the topic as your comments indicate you know something but we need to grow that knowledge base a little bit more

    Did you like this comment?
    Reply
  11. dz says:
    9 months ago

    🙈🙉🙊

    Did you like this comment?
    Reply
  12. Rainbolt44 says:
    9 months ago

    I don’t own nor do I want a cell phone that does everything but, the dishes. In case of an EMP strike, they will all go down anyway.

    Did you like this comment?
    Reply
  13. Valerama says:
    8 months ago

    This article didn’t really present anything but common knowledge. There is no way to keep Uncle Sam out of it; Apple and Google gave them easier access in 2020 for “covid tracking”, so if you’ve updated since then they can access your phone instantly (probably no warrant needed now). As for hackers, the easiest way to stop them is to not click on sketchy links and click bait. It is terrifying how easy it is to hack a phone or a whole system. Too many people don’t know how to tell if a link is legitimate and just open the door wide.

    Did you like this comment?
    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions Terms & Conditions.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

FOLLOW US ON:

PREPPER RECOMMENDS

YOU WILL NOT SURVIVE AN EMP STRIKE WITHOUT THIS

IF YOU SEE THIS PLANT IN YOUR BACKYARD BURN IT IMMEDIATELY

HOW TO GET 295 POUNDS OF EXTRA FOOD FOR JUST $5 A WEEK

THE AWESOME DIY DEVICE THAT TURNS AIR INTO FRESH WATER

5 INGENIOUS WAYS TO REFRIGERATE YOUR FOOD WITHOUT ELECTRICITY

HOW TO MAKE YOUR HOUSE INVISIBLE TO LOOTERS

Banner Generator

LATEST ARTICLES

DIY Poor Man’s Greenhouse

Why You Should Put A Silver Coin In Water

7 Stores Where You Can Buy Cheap Survival Food

Essential Survival Know-Hows Modern People Have Forgotten

What Happens If China Becomes The Ruling Economic Power Of The World

How To Treat And Heal Wounds With Sugar

5 Ways To Actually Use FEMA To Your Advantage

Long-Lasting Amish Burgers

How To Get Back Home After An EMP Strike

Why You Should Bury A Trash Can In Your Backyard

6 Signs Your Neighbor Will Become A Looter As Soon As SHTF

Ancient Types Of Homes You Can Build For Cheap

5 Unexpected Events Following An Economic Crisis That No One Talks About

How To Recondition Old Gasoline

Veggies You Only Plant Once And Harvest Forever

20 Prepping Items That Will Skyrocket In Price This Year

How To Use An Old Refrigerator For Survival

6 Places You Can Go Dumpster Diving For Your Prepper Stockpile

Great Depression Foods We Will All Be Eating Again Soon

Prepping Projects From The Bible

When The World Runs Out Of Food, This Is All You Need

Why You Need To Hide Your Harvested Rainwater

11 Fatal Mistakes To Avoid When Bugging Out

Banner Bor

Banner TLW2

The Lost Ways Claude Davis

HOW TO

How To Recondition Old Gasoline

How To Remove Radioactive Particles From Water In Case Of A Nuclear Fallout

How To Make Bread Last For Up To 5 Years

How To Prepare Your Car For SHTF

How To Cook Steak On A Stone In The Wilderness

How To Craft A Deadly Slingshot

How To Make Your Chickens Lay More Eggs

How To Make And Can Evaporated Milk

How To Prepare For The Rising Energy Prices

How To Protect Your Garden From Looting Intruders

Vote for ask a Prepper

YOU CAN ALSO FIND US ON:

Survial Websites Prepper

Banner LSF Hamburger

Copyright © 2014-2023 Ask a Prepper

  • Home
  • All Articles
  • Ask a Prepper
  • About Claude Davis
  • Terms of Use
  • Privacy Policy

Copyright © 2014-2023 Ask a Prepper

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.