How Hard is It to Hack a Phone? Understanding Its Protection Features

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ต.ค. 2024

ความคิดเห็น • 170

  • @Ruzhyn_Ukraine
    @Ruzhyn_Ukraine ปีที่แล้ว +10

    Now, tell us how Temu found 30 holes in the security layers and penetrated them in unrooted phones

    • @Corteum
      @Corteum 3 หลายเดือนก่อน

      Is that real?

  • @ReefGeoscience
    @ReefGeoscience ปีที่แล้ว +8

    Great video Rob. You really are providing a public service for users. Any chance you could do one for the Linux desktop: security, vulnerabilities etc?

  • @TheJackiMonster
    @TheJackiMonster ปีที่แล้ว +9

    Would be neat to have permission control as with SELinux on the desktop implemented properly. That could help GNU/Linux based phones as well.

  • @linsqopiring6816
    @linsqopiring6816 ปีที่แล้ว +13

    For some people a video like this might be a bit on the technical side but myself I love it when you really get into the nitty gritty and explain the terms. This is my favorite kind of video on your channel! But it's also great that you mix it up.
    What I've always wondered about and I'm praying you can answer now is how you can have any kind of serious encryption that's based on a pin code that I presume is four digits? You ALWAYS hear security people talking about the importance of long random passwords. Shouldn't it take them about one micro second to crack that by brute force? I feel like I'm missing a big part of the puzzle here and am hoping you can fill me in. Thanks Rob.

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +4

      I'm getting mixed results on the more detailed videos. Sometimes it performs extremely well and sometimes the more simplified videos do better. I can't predict. Maybe it's my titles and thumbnails

    • @linsqopiring6816
      @linsqopiring6816 ปีที่แล้ว +2

      Ok I will just give my theory for what this might be. That the OS rate limits login attempts and will lock up if an unusually high number is reached. Is that right? But what I still wonder about that is why couldn't they just make an image of the whole thing for unlimited attempts?

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +2

      The pin code is stored in the secure enclave. Not something you can access externally. It is not accessible via "flashing". So it is not possible to back it up

    • @linsqopiring6816
      @linsqopiring6816 ปีที่แล้ว +2

      @@robbraxmantech
      Thanks for that answer. I'd still like to understand it a bit better though. Whatever SDD or firmware a smartphone uses to store data I don't get why they couldn't just rip that out of the phone and put it into a specially made forensic enclosure to read its data.
      For example they can do that with your PC ram if you have a fully on the fly encrypted drive. They can pull the ram out and put it into their tool and see what was in the computer's volatile memory before it was turned off. With such advanced techniques for PC's I really don't get why they can't do something similar with smartphones especially considering their dominance these days. Why can't they rip out the hardware where the secure enclave is stored with the phone off, put it into an enclosure and image it?

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +3

      I don't think I've actually gone in super detail on the Secure Enclave. There's a hack for it as well but extremely risky. You could lose the data you're trying to capture. But at least the proof of concept showed it can be done (by accessing RAM)

  • @NorthernCorruptionMonitor907
    @NorthernCorruptionMonitor907 ปีที่แล้ว +15

    They just applied for a warrant to get past my PIN code lock easy peazy rights violated

    • @BearBig70
      @BearBig70 ปีที่แล้ว +7

      Where do you live? Commiefornia?

    • @neoliberalerneandertaler9347
      @neoliberalerneandertaler9347 ปีที่แล้ว +5

      ​@@BearBig70your a good example how important good education is.and how capitalism destroy human civilisation.ty

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว

      ...and a dinosaur just stood on the roof of my Rolls Royce car and dented it.
      So what? You could be anyone making up any kind of sh1t, just like me above.
      Maybe you're just paranoid and just THINK they are out to get you.

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว +1

      @@BearBig70 Never-Never-Land by the sounds of it - with Goldilocks and Chewbacca.

    • @Roadyheid
      @Roadyheid ปีที่แล้ว +9

      They can force you to hand over your phone, with a warrant, but they can't force you to give them your PIN. Some places, they can force you yo provide your biometrics (face, fingerprint), if that's how your phone is locked, but they can't make you hand over a PIN code. Use a PIN.

  • @jmr
    @jmr ปีที่แล้ว +15

    Agree with Rob 100%. I need physical access to hack a phone and even then I have to get lucky. It has to be one of the phones with known vulnerabilities and it has to be behind on security patches.

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว

      He never said that. There is plenty of malware on the Android Store that can act as a trojan horse to allow your data to potentially be accessed.
      Not all cyber-attacks are because someone starts attacking you. A piece of malware you install can signal to a command and control server that your phone is available to be exploited, at which point further software can be deployed to get more data from your phone.
      Most attacks are automated, it's not worth a human wasting time attacking systems unless the target is a well known person or a big corporation from which they can get a lot of kudos in their community.

    • @Corteum
      @Corteum 3 หลายเดือนก่อน

      Doesn't it depend on how capable you are as a hacker? The more capable you are, the more you're able to do? Imagine a Super AGI having all the worlds knowledge on hacking and what it could do with that knowledge.

    • @jmr
      @jmr 3 หลายเดือนก่อน

      ​​@@Corteum Sure but Rob covered nation state actors. Realistically they are the only ones that have access to a remote exploit. It can take an entire team to find that type of exploit these days. Even then if one other person or group finds it and turns it in the exploit will get patched. If the exploit gets used and someone finds out it gets patched.

    • @Corteum
      @Corteum 3 หลายเดือนก่อน

      @@jmr "Realistically they are the only ones that have access to a remote exploit."
      For now...... But AGI within 3 years. Super AGI within 5 years. It will find all of the holes and exploits in the state's computer systems. Hard to see how they (the inferior intelligence) will be able to defend against it.

    • @Corteum
      @Corteum 3 หลายเดือนก่อน +2

      @@jmr Post-AGI, it wont be just state actors that have the greatest access to, or the ability to create and distribute remote exploits. AGI/SAGI will be able to do a much better job of it than any state actors.

  • @kechekkk
    @kechekkk ปีที่แล้ว +2

    Malicious links to websites containing javascript that can access android phone location,camera and mic..there are youtube videos demonstrating this on an android phone..it’s still a form of social engineering..but a valid example

  • @worldwide.psychoterror
    @worldwide.psychoterror 4 หลายเดือนก่อน +1

    Hello, my gmx mail account has been hacked. Can you help?

  • @TonyAhmedSingh-ih7ix
    @TonyAhmedSingh-ih7ix ปีที่แล้ว +2

    Pegasus self opens via an SMS and they then have full control.

  • @DaddyElfMan
    @DaddyElfMan ปีที่แล้ว +3

    NO CLICK required, for pegasus, it merely (as far as reports go), needs to be 'SENT' to ones phone, basically, self activating.. .. scary.

    • @randsp3c709
      @randsp3c709 15 วันที่ผ่านมา

      Who uses this stuff ,law enforcement?

  • @utube7917
    @utube7917 ปีที่แล้ว +6

    Can you comment on the quick charge phone charger product that is supposed to stop planned obsolescence? I do believe that phone companies give mandatory bogus updates that degrade the phones, so that you have to buy a new one sooner. This product claims to stop those degrading updates, but does it actually work? It says it was featured on many mainstream news outlets and there is a legal battle going on behind the scenes. In my opinion, if you buy a product, the company has no right to degrade your product through mandatory updates after purchase. Can you imagine if your car dealer was in your driveway at 5am removing your vehicles exhaust system and putting pvc pipe on instead? You buy these products as is, not as they will be with the secret planned mandatory downgrades that are beyond your control, disguised as "updates."

    • @jmr
      @jmr ปีที่แล้ว +4

      What you described is not a legitimate product. The way you charge your phone has nothing to do with software updates. There is a product that has Bluetooth and it monitors your phone charge state and prevents certain types of overcharging.

    • @utube7917
      @utube7917 ปีที่แล้ว +2

      @jmr right, charging is not rela5ed to updates, but that product claims to have software loaded onto the adapter, which is supposed to download to your phone when plugged in and claims to disable the preloaded software / updates for planned obsolescence. I know its possible, it could have software loaded on anything that plugs into your phone by USB, whether it charges or not, which is a common way computers get attacked when someone unsuspectedly plugs a USB into their computer or a work computer.

    • @jmr
      @jmr ปีที่แล้ว +4

      @@utube7917 Listen to Rob's hacking phone talk again. They can't override the underlying operating system. That thing is a hoax.

    • @utube7917
      @utube7917 ปีที่แล้ว +1

      @@jmr thank you, haven't heard that episode yet

    • @jmr
      @jmr ปีที่แล้ว +1

      @@utube7917 I'm referring to this video you're commenting on. It explains how hard it is to hack a phone. selinux is very secure.

  • @harryvendryes
    @harryvendryes ปีที่แล้ว +2

    What about the security of a Linux desktop computer, that only receives its Internet from the internal SIM of a router (i.e. no landline)? Using a Turris Omnia (with just a SIM) would be a good example of this.

  • @ASAN2042
    @ASAN2042 ปีที่แล้ว +2

    Its horrible that we live in a time where people must buy and sell freedom. At the end of the day, i think it'd be even more suspect in the mind of the powers that be, if a citizen is purchasing freedom. A mind would possibly conclude that something important or detrimental may be being concealed. Idk. Its all crazy times🤯 great vid...(couldnt understand it all cause im not so great with tech) but great vid!

  • @dangercat5844
    @dangercat5844 ปีที่แล้ว +2

    Thanks Rob. Does MacOS run apps in VM if installed from Mac App Store, so more secure?

  • @girl4632
    @girl4632 10 หลายเดือนก่อน +1

    What about already the known vulnerability in Android and other applications they could be exploited

  • @krollpeter
    @krollpeter ปีที่แล้ว +5

    Usually I root for the purpose of removing the spam that comes with almost every phone. Often these are apps that harmful themselves, such as by Facebook, shopping apps, or things that try to remote-control me from Google. Therefore, I also like installing firmware that does not use Google services.

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว +2

      Then you are very foolish and haven't a clue about how phone security works. You need to watch this video properly.
      If you don't want spam on your phone, de-Google it with a custom ROM - you don't even need root for that.

    • @niveZz-
      @niveZz- ปีที่แล้ว

      ​@@terrydaktyllus1320you do need to unlock your bootloader tho
      I gave the same advice to many people but it's not as easy to do and there are many downsides

    • @krollpeter
      @krollpeter ปีที่แล้ว

      @@terrydaktyllus1320 I would not call trying to solve an issue foolish, and I watched the video. There is a lot more "spam" on the phone than displayed as icons on the screen. And also, nowadays most custom ROMs come with Foogle. Mine not.

    • @NorthernChimp
      @NorthernChimp ปีที่แล้ว +1

      It seems that there is a proper way to root a device, that is reversible. I think Terry is right in principle, but if you need an "official" phone for a reason, maybe this could be a middle ground, locking it back after cleaning it up?

    • @krollpeter
      @krollpeter ปีที่แล้ว

      @@NorthernChimp If you de-install Magisk the phone will be automatically unrooted. My recovery can uninstall Magisk. Some banking software and other can still detect that the phone was once rootet.
      Here in Singapore many government office functions are done via Android or Iphone apps. Most of these refuse to even open on rooted and now un-rooted devices.
      I personally scan through the content inside the app file of every single app I install, and remove all references to Facebook, Amazon, Google as far as possible, Yandex and other known trackers. My Google dashboard is absolutely empty, since 2013.
      The Aurora app store displays the trackers each app has. It is not 100 % but a starting point. What we see with our eyes on screen is only a fraction of the actual spyware and tracking. One day I had in 24 h 700 trackers trying to get into my phone, all at my bandwidth and my cost.

  • @themetalprincess
    @themetalprincess 5 หลายเดือนก่อน +2

    Law enforcement can gain access easily to your phone once it has physical access. Even though they would not call it "hacking" the user likely would. So the common belief that because your phone is password protected and cannot be accessed or hacked is not true. It is very vulnerable with physical access, unless it is physically encrypted via hardcore 3rd party encryption. Braxman is by far the most knowledgable tech guy I have seen to date so I was surprised to hear him praise cell phone security. Im a computer tech myself of 27 years, and Braxmans knowledge dwarfs my own, but your average cell phone is not unhackable. The average law enforcement data forensics lab can gain access to your data in less than 30 minutes.

    • @jawilz6043
      @jawilz6043 3 หลายเดือนก่อน

      very true

  • @devinavant9086
    @devinavant9086 11 หลายเดือนก่อน +1

    I have cops that hacked my phone so they can screw with me. Can you help me find the app they installed on my phone.

    • @jawilz6043
      @jawilz6043 3 หลายเดือนก่อน

      They dont need to install an app. Once they have ur simcard number, model number of phone or phone number they can access your phone n monitor everything ur doing on it, n also see all contents u have on it.

  • @keenanforytube
    @keenanforytube ปีที่แล้ว +1

    My BraxOS was hacked. How would I do a dump to forensic the data?

  • @TonyAhmedSingh-ih7ix
    @TonyAhmedSingh-ih7ix ปีที่แล้ว +1

    I was hoping to speak with you via the app but it says it's only for older devices.
    I have a serious issue with Private Detective's sending phone hacking software via SMS, forcing hate messages into my social media, stealing money out of my bank accounts via PayPal purchase's and so much more.
    I need help.

    • @robyee3325
      @robyee3325 7 หลายเดือนก่อน

      The sheriff’s office working with Feds to violate your rights. Get ready for new world order

  • @مقاطعمترجمة-ش8ث
    @مقاطعمترجمة-ش8ث หลายเดือนก่อน

    BTW both Linux SElinux and FreeBSD jail, does provide mobile phone's level of protection, but you have to configure it yourself.
    3:08 Java not the only language supported by the apps, but you can build .so library and load it from java

  • @manomyth11
    @manomyth11 10 หลายเดือนก่อน +1

    🤔How come you do your videos from an RV? 😁

  • @lyfandeth
    @lyfandeth ปีที่แล้ว +3

    Rob, can you explain what Samsung Knox will do to a phone? Make some things impossible, or just provide an extra security layer? Downsides?

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +2

      It's an ANTIVIRUS. LOL. I had to research that. :)

    • @NorthernChimp
      @NorthernChimp ปีที่แล้ว +1

      I never activated it, mainly because the TOS are 3km long and only in German (on my phone brought in France), and selecting is disabled when I view them, so I can't use any translating software.

    • @peterkoch3777
      @peterkoch3777 ปีที่แล้ว

      This is snake oil! Avoid like the plague 🤔

  • @id104335409
    @id104335409 2 หลายเดือนก่อน

    Just last week I watched a bluetooth hack that is just recently discovered and patched - leaving billions of devices still exploitable since they dont receive updates like PC. The hack only requires that you leave your bluetooth on and the hacker is in range. He can install anything on your phone while its in your pocket. No need of confirmation of connection.

  • @ssdjaja1
    @ssdjaja1 8 วันที่ผ่านมา

    Hi Rob, what do you think about Sirin Solarin phone? Is it really unhackable?

  • @robyee3325
    @robyee3325 7 หลายเดือนก่อน +1

    You no longer have to be an important person to be targeted by the government. The more people they put on the watchlist the more funding they get. They are incentivized to put you on the list!

  • @garypaulson5202
    @garypaulson5202 ปีที่แล้ว +2

    Excellent video, very informative

  • @Perry_Neum
    @Perry_Neum ปีที่แล้ว +1

    As Apple releases another patch for IOS back doors😂

  • @POPMOGOMAX-go7mx
    @POPMOGOMAX-go7mx 4 หลายเดือนก่อน

    Paying cash for your computer and getting a paper reset help with privacy.

  • @vargasbj
    @vargasbj 11 หลายเดือนก่อน +1

    Hello Bob.
    Please gives your thoughts whether a YUBYKEY can prevent BIG-TECH telemetry to each of us.
    Greeting from Costa Rica

  • @C_note773
    @C_note773 5 หลายเดือนก่อน

    I always wondered how secure the Google Titian security chip is

  • @katehillier1027
    @katehillier1027 4 หลายเดือนก่อน

    TH-cam seems to have unsubscribed me from numerous channels.

  • @randsp3c709
    @randsp3c709 15 วันที่ผ่านมา

    What can i do if it has been hacked. Like someone is accessing the mic , and knows texts and location

  • @c.s.9999
    @c.s.9999 ปีที่แล้ว +1

    Hello👋 so I seen on TikTok where people was putting a certain code into their phone to see if they had been hacked. As though someone was listening in on our phone calls. Was just wanting to know how true it is😳🤔

    • @robyee3325
      @robyee3325 7 หลายเดือนก่อน +1

      That is simply to see if your call forwarding is enabled. Won’t tell you if you are hacked or not

  • @FunBotan
    @FunBotan ปีที่แล้ว +17

    Zero-days may not be a threat for the common folk as long as they use an updated OS on the device. However, a lot of devices are still being used long after their support is dropped by the manufacturer, and for those users, the risk of zero-day-based attacks is no longer negligible.

    • @kentallard1881
      @kentallard1881 ปีที่แล้ว +2

      You are more right then you know.

    • @thekeysman6760
      @thekeysman6760 ปีที่แล้ว +4

      ​@@kentallard1881"than" you know. 👍

    • @kentallard1881
      @kentallard1881 ปีที่แล้ว

      @@thekeysman6760 Then,Than,Thanks for pointing that out,Now please,Eat shit?

    • @DarkMetaOFFICIAL
      @DarkMetaOFFICIAL 10 หลายเดือนก่อน

      yah 0days are patched constantly. i have someone telling me phones are so easy to hack, they delete their social medias and think phone service is identical to isp. because they were tricked to thinking they were hacked. smh

    • @DarkMetaOFFICIAL
      @DarkMetaOFFICIAL 10 หลายเดือนก่อน

      @@kentallard1881 *than 😂❤️

  • @oodles86
    @oodles86 หลายเดือนก่อน

    We have to create a login just to browse your store?

  • @donquihote6023
    @donquihote6023 2 หลายเดือนก่อน

    How about a text message from someone you know?

  • @user-ze1bg2dz1s
    @user-ze1bg2dz1s 2 หลายเดือนก่อน

    What about packet captures?

  • @gordo8189
    @gordo8189 9 หลายเดือนก่อน

    Rob, I think I missed something. How, by adding his son's iPad (presumably living with mom) to his own Apple ID, does dad gain access to anything on mom's iPad? I understand that dad could spy on the son, maybe even "listen in" but surely mom's texts are on her iPad, on a totally different Apple id?? Wouldn't this allow mom to spy on dad?

  • @Lionelmeng-vu3rw
    @Lionelmeng-vu3rw ปีที่แล้ว +1

    Thanks for the information 😅

  • @joseluisvazquez5126
    @joseluisvazquez5126 ปีที่แล้ว

    The paper Bitcoin I fear is the one we might end up having if we ever need to onboard people at a rate over 7 per second, opening s LN channel per newcomer.
    Once you have billions of people onboarded, for all to be peers, unlike in the Fiat world, everybody needs to have some kind of ownership proof on sats on the layer 1.
    If we do not solve this problem, most people will end up onboarding on pure Bitcoin IOUs, and be second class citizens on this new money. That looks a lot like the gold weaknesses that lead to its demise.
    I think we should be able to figure it out, but it is still pending.
    Somehow we should be able to split UTXO ownership without bloating the blocks nor requiring weird protocol extensions.

  • @christinewoodland5127
    @christinewoodland5127 ปีที่แล้ว

    What about adds I have seen about gaining access to “ your children’s phone, to keep them safe “ ( of course) “ text, email, social media, photos, camera, microphone, internet “. “All you need is their number, you don’t need physical access to the phone “ for a monthly fee. I’ve never tried it, so no idea if it actually works .

  • @DarkMetaOFFICIAL
    @DarkMetaOFFICIAL 10 หลายเดือนก่อน

    a girl is swearing to me she knows how hacking works yet tells me they have my phone ip! omg she will not listen

    • @robyee3325
      @robyee3325 7 หลายเดือนก่อน

      Who cares you’re a police informant anyway

  • @girl4632
    @girl4632 10 หลายเดือนก่อน

    Wht about already installed app by phone maker the bloatware and unnecessary apps with unnecessary permission.
    In my phone I used adv to remove them and phone maker has kept restrictions on tht too now my settings not open and adb isn't able to access shell

  • @mlevif
    @mlevif 11 หลายเดือนก่อน

    Is there any Linux version that supports this? I don't think SELinux does, does it?

  • @katehillier1027
    @katehillier1027 4 หลายเดือนก่อน

    TH-cam not letting me subscribe. Previous subscriber.

  • @teresajackson5859
    @teresajackson5859 ปีที่แล้ว +1

    I know that all my working phones has been hacked by corrupt cops. I am on constant surveillance even though I am 64 years old and am not a criminal or ever has been. I know they did something to my phones because my new phone battery runs out quickly and I'm always getting a notification that I need to clean my phone. They watch me and listen to my phone calls read all my messages my email messages as well and so much other like interrupt my wifi signal when nobody else is around. they can see everything I do on it including they know all my passwords. I cannot disable the camera their technology they had access to is so advanced that nothing I have been able to do has worked so far not to mention I know very little about codes. What can I do

    • @linsqopiring6816
      @linsqopiring6816 ปีที่แล้ว +1

      Sometimes the simplest explanation is the correct one. Could be your phone is just broken. I'd get a new one and see if it happens again. A brax phone will protect you from many types of spying. But no phone is 100% secure so best not to put anything sensitive on it.

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +5

      My friend, perhaps we have conversed before. But just to make it clear, your actual threats are EXTERNAL to the phone. Cops have access to you via CALEA systems. They don't even have to touch your phone. So I'm not countering your fear of a threat, but likely it is not inside your phone. Cops can also do Stingray and other surveillance but all external to the phone itself. Physical manifestations on the phone are not likely hacks because if I hack your phone, you're not going to know it.

    • @LynyrdSkynyrd.4Ever
      @LynyrdSkynyrd.4Ever ปีที่แล้ว +1

      You should get rid of your smart phone and go back to a simple flip phone that it's main purpose is making phone calls. No Internet access, no data on it, and not worth the effort to hack. It sounds like you have a virus infestation of some kind, which is another problem you won't have with a flip phone

    • @NorthernChimp
      @NorthernChimp ปีที่แล้ว +3

      If while browsing you see a notification telling you that you need to clear your phone, it does not come from your phone but from the website. If you click on it, that's when malware is installed. Just leave the rogue site forever. If you ever once agreed to "clean your phone", I'm afraid that's where all that comes from.

    • @robyee3325
      @robyee3325 7 หลายเดือนก่อน

      @@LynyrdSkynyrd.4Everold flip phones are the least secure because they operate on 2g/3g. With the move to 4g/5g most flip phones are just as vulnerable as smart phones anyway. Only difference is they don’t have wifi. Sheriffs office is working with Feds to hack your phone through cell network

  • @latetotheparty7551
    @latetotheparty7551 ปีที่แล้ว

    Much appreciated series of explanations. I'll definitely have to re-watch it a bit to more fully understand but appreciate the information!

  • @Zephyr9521
    @Zephyr9521 ปีที่แล้ว +1

    Rob Braxman, which smartphone brand has the most privacy? I have a Samsung Smartphone and when I try to remove a permission from an app, for example the app: "Google Play Services", this message appears: "Device requires this permission to operate" and I can't remove it, this also happens in other apps, Samsung apps require a lot of permissions, sometimes unnecessary, my Smartphone Discharges very fast, I suspect that it is being tracked by Big Techs and other companies, but what do you think about all this?

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +3

      You have no ability to restrict Google code

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +3

      The only privacy choice for the typical consumer is a de-Googled phone

    • @Zephyr9521
      @Zephyr9521 ปีที่แล้ว +1

      What is a de-Googled phone? A regular cell phone that you install an operating system free of Google code?

    • @chazzlidell1492
      @chazzlidell1492 ปีที่แล้ว

      @ I do, because I spend hours looking for exploits and found rwo in 48 hours. Not bad MR Braxman.

    • @lyfandeth
      @lyfandeth ปีที่แล้ว +1

      Samsung has "baked" these applications into the phone for their own profit, and there's no way for the common user to remove them. When Rob suggests one of the few available deGoogled phones, that's the only reliable way--and even then there's collateral damage.

  • @Ed-ty1kr
    @Ed-ty1kr 11 หลายเดือนก่อน

    Well this video certainly ended on a bad note...

  • @elainec2577
    @elainec2577 ปีที่แล้ว

    How about someone that accesses your speaker ??

  • @jesss539
    @jesss539 11 หลายเดือนก่อน

    @robbraxmantech a question regarding backing up and phone wipe. If someone managed to corrupt the device, if you back up before wiping the device would the rogue software be also backed up and reinstated afterwards?

  • @peregrinemccauley5010
    @peregrinemccauley5010 ปีที่แล้ว

    Left my phone in the sun by the pool . It's rooted .

  • @etziowingeler3173
    @etziowingeler3173 9 หลายเดือนก่อน

    great work, love this channel

  • @aranramirez1772
    @aranramirez1772 ปีที่แล้ว

    Useful information. Thanks

  • @rebokfleetfoot
    @rebokfleetfoot ปีที่แล้ว

    i'm shocked i did not know this

  • @yuka-youtube
    @yuka-youtube ปีที่แล้ว

    land tele was so robust safe

  • @deborahwalden8067
    @deborahwalden8067 ปีที่แล้ว

    Hi Rob! You are looking good. ❌♥️Deborah

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +1

      Thank you my friend. Good to see you're still here!

  • @stevebarnes8976
    @stevebarnes8976 ปีที่แล้ว

    Rob can a chrome back be hacked...?

  • @_Auroswim._.Ocean_Swimming
    @_Auroswim._.Ocean_Swimming ปีที่แล้ว

    If Android is so secure, why don't you open untrusted links in a mobile browser?

  • @teresajackson5859
    @teresajackson5859 ปีที่แล้ว

    I can see a light that blinks in my phone that is not a camera light. I disabled my camera but the light is still blinking

    • @OPOS-el7tj
      @OPOS-el7tj ปีที่แล้ว +1

      Ghost of Jobs

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +2

      Depending on the phone model there are alert lights which a programmer can use for various purposes (like to indicate a phone alert, battery status, charge status). Hacks have to have a purpose. For so much effort to hack, flashing a light doesn't really do much. If I wanted to instigate fear into a person, I'd send a message with personal data only you know...that's real proof of a hack.

    • @teresajackson5859
      @teresajackson5859 ปีที่แล้ว

      @@robbraxmantech my phone also beeps this loud sound when I'm on the phone I can't hear the other person talking it's so loud and don't police surveillance use this blinking light. My ex has the same phone and his phone does not have a blinking light that is not the camera

    • @NorthernChimp
      @NorthernChimp ปีที่แล้ว

      @@teresajackson5859 A beep is a notification, isn't it? Did you look in your received notifications, and in your notification settings?

  • @fipfip3331
    @fipfip3331 ปีที่แล้ว

    What about non rooted linageos devices for example?

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว +3

      You don't need to root a device to install Lineage OS (or any of the others) on it - you need to unlock the bootloader which is completely different.
      Rooting a phone removes an entire security layer that protects your data, it is a STUPID thing to do on your daily driver devices.
      Sure, go get a burner phone or two and have fun rooting them and trying out some cool security tools to learn something new - but keep any personal information off of them because rooting creates a big security hole on any device.

    • @linsqopiring6816
      @linsqopiring6816 ปีที่แล้ว +2

      @@terrydaktyllus1320
      Doesn't rooting just put it to a similar situation to windows where apps have greater control? In fact even a rooted phone would be safer than windows because of SELinux. So do people who say rooting a phone is stupid say that using windows is super stupid? If not I don't see how you can reconcile that.

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +2

      LOL on Windows being stupid! Fact is that was the only way software was made originally. Mobile apps is a new way. Good news and bad news there. Depends on what the programmer wants to accomplish

    • @terrydaktyllus1320
      @terrydaktyllus1320 ปีที่แล้ว

      @@linsqopiring6816 No, SELinux does not directly defend against root access permissions being granted by enabling the root account.
      Have you never heard of "Defence In Depth" where the concept of security is to apply multiple layers that need to be breached before access might be achieved?
      Do you not understand that SELinux acts as one security layer, and leaving root disabled is another one?
      Just because one exists does not negate the need for the other to exist.

    • @linsqopiring6816
      @linsqopiring6816 ปีที่แล้ว +2

      @@robbraxmantech
      So a Brax phone is the best of both worlds, it has no google spyware and the security bonuses of AOSP?

  • @GaryLives77
    @GaryLives77 ปีที่แล้ว

    What about tablets?

    • @robbraxmantech
      @robbraxmantech  ปีที่แล้ว +2

      Same protections. But the good news is that tablets without cell do not have a baseband modem so that attack vector does not exist

    • @gordo8189
      @gordo8189 9 หลายเดือนก่อน

      That's easy, take 2 tablets before every meal..

  • @chazzlidell1492
    @chazzlidell1492 ปีที่แล้ว

    I can hack it. just kidding I don't even know how to tie my own sneakers. I think the best way to hack a phone or application is to dive deep and see what makes it tick.

  • @SG003
    @SG003 ปีที่แล้ว

    People are just paranoid

  • @DaddyElfMan
    @DaddyElfMan ปีที่แล้ว

    question is this, how does one bypass or DENY an app (for android), these requests for access to ones phone. MOST, but not all, apps, REQUIRES one to ACCEPT their terms of service WHICH includes this level of access, if you decline, then NO APP. FRUSTRATING!!

  • @DaddyElfMan
    @DaddyElfMan ปีที่แล้ว

    PEGASUS

  • @FuckYourFeelings914
    @FuckYourFeelings914 9 หลายเดือนก่อน

    😂😂😂😂nothing online or that has a IP address is secure, period, absolutely nothing

    • @robyee3325
      @robyee3325 7 หลายเดือนก่อน

      Same with anything connected to cell network