Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
As governments around the world impose new restrictions on internet freedom, it is worth remembering what is at stake. The present crackdown comes as digital platforms are being used in new and creative ways to advocate for change and, in many cases, save lives. Internet advocacy had real-world results in both democracies and authoritarian settings over the past year, and its impact was often most pronounced in countries where the information environment was more open online than off. In over two-thirds of the countries examined in this study, there was at least one significant example of individuals producing a tangible outcome by using online tools to fight for internet freedom, demand political accountability, advance women’s rights, support victims of unjust prosecution, or provide relief to those affected by natural disasters.
Fighting for internet freedom and digital rights
Social media were used effectively to fight for internet freedom in a variety of countries over the past year. In Thailand, over 150,000 people signed a Change.org petition against a government plan to centralize the country’s internet gateways, which would strengthen the authorities’ ability to monitor and censor online activity. As a result, the government announced that it had scrapped the plan, though skeptical internet users remain vigilant.
Using the hashtag #NoToSocialMediaBill, Nigerian digital rights organizations launched a multifaceted campaign to defeat a “Frivolous Petitions Prohibition Bill” that threatened to constrain speech on social media. Alongside significant digital media activism, civil society groups organized a march on the National Assembly, gathered signatures for a petition presented during a public hearing on the bill, and filed a lawsuit at the Federal High Court in Lagos, all of which contributed to the bill’s withdrawal in May 2016. India’s telecommunications regulator banned differential pricing schemes in February after more than a million comments were submitted online to protest companies that charge consumers different prices for select content or applications.
Facebook: awkward family dinner party we can’t really leave Tweeter: a lot of us simply do notunderstand the point of Twitter. There is always a core group at every school that uses it very religiously to tweet and another group that uses it to simply watch or retweet, but besides that many don’t use it. Tumblr: is where you are your true self and surround yourself (through who you follow) with people who have similar interests. It’s often seen as a “judgment-free zone” where, due to the lack of identity on the site, you can really be who you want to be. Instagram:“Everything about the application makes it less commercialized and more focused on the content, meaning more teens are inclined to visit it. Twitter:“To be honest, a lot of us simply do not understand the point of Twitter.” Snapchat:“Snapchat has a lot less social pressure attached to it compared to every other popular social media network out there. Tumblr:“Tumblr is where you are your true self and surround yourself (through who you follow) with people who have similar interests. Yik Yak: People reference Yaks all the time with each other or send screenshots
LinkedIn — We have to get it, so we got it. Many wait until college to get this (as they probably should, it isn’t for this demographic anyways).
Pinterest—It’s mainly female-dominated and is for those who have an artsy/hipster focus. Not too many people talk about it.
Kik—It’s a messaging application that is mainly used for messaging people on Twitter I guess? I don’t know anyone who uses it. The only time I ever hear this application is for the joke, “Aye you got Kik?”, normally seen as someone trying to “spit game” to attract a partner. It’s really difficult for me to describe it here but it isn’t super relevant.
WhatsApp—You download it when you go abroad, you use it there for a bit before going back to iMessage and Facebook Messenger, then you delete it.
GroupMe—Byfarthe most used group messaging application in college.
messaging one another through a network that doesn’t require cell towers or Wi-Fi nodes. They’re using an app called FireChat that launched in March and is underpinned by mesh networking, which lets phones unite to form a temporary Internet.
My note: seems that civil disobedience provides excellent innovations in using technology; examples are-
Mesh networking is still only an IT term. Internet and dbase search has no returns on mesh networking as a tool for education and/or civil disobedience. Will it be the continuation of moblogging, backchanneling and swarming?
now that he has a phone, he would rather check out other cooler options, like Snapchat, Vine, and Instagram.
words are less important than images and videos
“I wouldn’t de-activate,” Aidan said. “It’s still a way to connect, I just won’t check it often.”