Godlike Productions - Discussion Forum
Users Online Now: 2,283 (Who's On?)Visitors Today: 506,773
Pageviews Today: 833,222Threads Today: 281Posts Today: 4,677
09:58 AM


Rate this Thread

Absolute BS Crap Reasonable Nice Amazing
 

How do spies and hackers invade your privacy, your phone and other devices?

 
Beyond
Offer Upgrade

User ID: 74917598
United States
11/26/2020 05:36 PM
Report Abusive Post
Report Copyright Violation
How do spies and hackers invade your privacy, your phone and other devices?
It is said that all a hacker needs are one of three things to hack your phone:

1) your phone number
2) your IMEI number
3) your IP number

So it's safe to say that if you know how to hack a phone it's easy as hell to do it. Can someone explain exactly how it's done so those of us that aren't in the know can wisen up to protect our privacy?

Once a hacker is in your phone they have access to everything and more than you can access as the owner of your phone. They can access all of the phone's logs and data including your phone book, call history, keylogger, passwords, internet history, the camera and microphone (and they can listen in on you in real time when your phone is at rest) and they can also access the applications downloaded onto your phone and the data stored there.

Last Edited by Bankroll on 04/16/2021 05:09 PM
Not anutter cig nature.
Beyond  (OP)

User ID: 74917598
United States
11/26/2020 05:41 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I am going to preemptive strike here and warn you that anyone that tries to deride this thread or discourage serious and informative replies or otherwise tries to muddle this up will be banned from posting in my future threads.
Not anutter cig nature.
Agent Nothing

User ID: 47376968
United States
11/26/2020 09:41 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I send you a link, you click on it and it sneaks in a program on your phone that allows me into it
I am not the Nobody.
jimmyrigger

User ID: 78879187
United States
11/26/2020 11:00 PM

Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
There is a phone app that allows a person to listen
to you at all times. They can get info off your
phone, I am not sure how much, and they can find
where you are at any time.
Legal ? Don't know, but its out there !
Beyond  (OP)

User ID: 73385623
United States
11/27/2020 01:40 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I send you a link, you click on it and it sneaks in a program on your phone that allows me into it
 Quoting: Agent Nothing


While I was job searching several months ago I was getting these text messages from phony employers that found my number on work search sites. I always double checked them through the internet on my computer first to see if they were legit.

There is an email scam that hackers use where they send you a download attachment that contains a computer virus to bore a hole through your firewall so they access your hard drive.
Not anutter cig nature.
Beyond  (OP)

User ID: 73385623
United States
11/27/2020 01:42 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
There is a phone app that allows a person to listen
to you at all times. They can get info off your
phone, I am not sure how much, and they can find
where you are at any time.
Legal ? Don't know, but its out there !
 Quoting: jimmyrigger


When I do catch one of these hacker bastards I sure as hell wont be putting them behind bars.
Not anutter cig nature.
Mist Walker

User ID: 79127210
United States
11/27/2020 02:22 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Usually via bluetooth. Otherwise it takes pretty expensive hardware and a good knowledge of coding.
Beyond  (OP)

User ID: 73385623
United States
11/27/2020 02:37 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Usually via bluetooth. Otherwise it takes pretty expensive hardware and a good knowledge of coding.
 Quoting: Mist Walker


I am using Package Disabler Pro to disable all the bluetooth and wifi on my phone. Apparently you can really screw the hackers with personalized apps so long as you root your phone but try as I might the damn rooting scams never work and I always get fail messages while rooting. I guess rooting usually works on the most expensive phones. There's some hack tracing apps for particular iPhones that allows you to backhack to their IP
Not anutter cig nature.
aShogunNamedMarcus

User ID: 78825749
Canada
11/27/2020 02:40 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I send you a link, you click on it and it sneaks in a program on your phone that allows me into it
 Quoting: Agent Nothing


While I was job searching several months ago I was getting these text messages from phony employers that found my number on work search sites. I always double checked them through the internet on my computer first to see if they were legit.

There is an email scam that hackers use where they send you a download attachment that contains a computer virus to bore a hole through your firewall so they access your hard drive.
 Quoting: Beyond


There's several different ways but they all border on similar. But the general way to do it is to usually have program do it for you.

picture attachments via sms / txt msg. its a link with code in it. You receive a text. Move from text list to text msg, you activate and authorize it to run. Just like the email attachment method (beware small file attachments with funny file extensions).

porn sites have the similar exploit but the code is in the video or overlayed it so to speak.

as usual, someone clicks something or opens something with unintended consequences for themselves. sometimes the exploit is undirected meaning its meant for anyone, they'll use a dialer that dials/texts out an "attachment" to a spread of phone numbers. other times its directed.

if you want to read and get you geek on, go to grc dot com and click the research tab, historical, worm wars. or start searching up phone security.
I'll play the game for the games own sake.
aShogunNamedMarcus

User ID: 78825749
Canada
11/27/2020 02:45 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Usually via bluetooth. Otherwise it takes pretty expensive hardware and a good knowledge of coding.
 Quoting: Mist Walker


The #1 method of hacking was always social engineering. Using people against themselves.

And you only need stuff like you said if you're going up against a hacker or movie like entity. Most regular people dont give a fuck about phone security ("firewall? I have nothing to hide.... hey why are my titties online? oh I'm gonna kill my now ex bf") so the majority are easy targets.
I'll play the game for the games own sake.
Mist Walker

User ID: 79127210
United States
11/27/2020 02:59 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Social engineering is old and outdated. A study showed more than 70% of people walk around with Bluetooth on, its why its the #1 source for exploits.

We used to use trojans and viruses with links. Then we switched to QRL injections within links. Now most just use Bluetooth for hacking phones.
Beyond  (OP)

User ID: 73385623
United States
11/27/2020 03:05 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I send you a link, you click on it and it sneaks in a program on your phone that allows me into it
 Quoting: Agent Nothing


While I was job searching several months ago I was getting these text messages from phony employers that found my number on work search sites. I always double checked them through the internet on my computer first to see if they were legit.

There is an email scam that hackers use where they send you a download attachment that contains a computer virus to bore a hole through your firewall so they access your hard drive.
 Quoting: Beyond


There's several different ways but they all border on similar. But the general way to do it is to usually have program do it for you.

picture attachments via sms / txt msg. its a link with code in it. You receive a text. Move from text list to text msg, you activate and authorize it to run. Just like the email attachment method (beware small file attachments with funny file extensions).

porn sites have the similar exploit but the code is in the video or overlayed it so to speak.

as usual, someone clicks something or opens something with unintended consequences for themselves. sometimes the exploit is undirected meaning its meant for anyone, they'll use a dialer that dials/texts out an "attachment" to a spread of phone numbers. other times its directed.

if you want to read and get you geek on, go to grc dot com and click the research tab, historical, worm wars. or start searching up phone security.
 Quoting: aShogunNamedMarcus


Thank you for the site suggestion and information.
Not anutter cig nature.
Beyond  (OP)

User ID: 73385623
United States
11/27/2020 03:07 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Social engineering is old and outdated. A study showed more than 70% of people walk around with Bluetooth on, its why its the #1 source for exploits.

We used to use trojans and viruses with links. Then we switched to QRL injections within links. Now most just use Bluetooth for hacking phones.
 Quoting: Mist Walker


What is a QRL injection?
Not anutter cig nature.
aShogunNamedMarcus

User ID: 78825749
Canada
11/27/2020 03:20 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Social engineering is old and outdated. A study showed more than 70% of people walk around with Bluetooth on, its why its the #1 source for exploits.

We used to use trojans and viruses with links. Then we switched to QRL injections within links. Now most just use Bluetooth for hacking phones.
 Quoting: Mist Walker


What is a QRL injection?
 Quoting: Beyond


I think it has a section on the grc. I havent been up to date on this stuff in years.
I'll play the game for the games own sake.
aShogunNamedMarcus

User ID: 78825749
Canada
11/27/2020 03:34 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Thank you for the site suggestion and information.
 Quoting: Beyond


No problem. The info is on the older side but it can be geeky cool.
I'll play the game for the games own sake.
Beyond  (OP)

User ID: 75538721
United States
11/27/2020 10:43 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
What about when your phone is turned off? Can a hacker use your number through his own devices?
Not anutter cig nature.
Beyond  (OP)

User ID: 72786414
United States
11/28/2020 03:50 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Another thing to consider is manufacturer hacks and pre-loaded spyware. Smartphone companies are more likely than not spying on their customers and design their products so that they can access them whenever they would like to cull the data. Some of the coders that write the software could also sneak in back ddor hacks of their own without the manufacturer aware. Something to consider, why wouldn't they? You'd be dumb to say these sorts of things never happen. You should see the extremities some people have gone to get access to my emails or find out some meaningless piece of data. Some of them stop at nothing and go the extra kilometer.
Not anutter cig nature.
Beyond  (OP)

User ID: 75524580
United States
12/10/2020 04:05 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Another thing to note is that charging stations could be a hacker point of access.
Not anutter cig nature.
COSMIC WARRIOR

User ID: 76355711
United States
12/10/2020 04:11 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
What about when your phone is turned off? Can a hacker use your number through his own devices?
 Quoting: Beyond


If they cloned your phone onto their device then yes...
"The syntactical nature of reality, the real secret of magic, is that the world is made of words. And if you know the words that the world is made of, you can make of it whatever you wish."

~ Terence McKenna
Beyond  (OP)

User ID: 75524580
United States
12/10/2020 04:21 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
What about when your phone is turned off? Can a hacker use your number through his own devices?
 Quoting: Beyond


If they cloned your phone onto their device then yes...
 Quoting: COSMIC WARRIOR


So this method would work like Windows 10 remote access.

Last Edited by Bankroll on 12/10/2020 04:21 PM
Not anutter cig nature.
Marioccena89

User ID: 79734284
Romania
12/10/2020 04:36 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
It is said that all a hacker needs are one of three things to hack your phone:

1) your phone number
2) your IMEI number
3) your IP number

So it's safe to say that if you know how to hack a phone it's easy as hell to do it. Can someone explain exactly how it's done so those of us that aren't in the know can wisen up to protect our privacy?

Once a hacker is in your phone they have access to everything and more than you can access as the owner of your phone. They can access all of the phone's logs and data including your phone book, call history, keylogger, passwords, internet history, the camera and microphone (and they can listen in on you in real time when your phone is at rest) and they can also access the applications downloaded onto your phone and the data stored there.
 Quoting: Beyond


all of this only happen to android, as an amateur hacker i can hack all android phones that are on the same wifi connection or plugged to usb.
androids can also be hacked throught all types of apps and websites.
iphones tho cant be hacked, at least not on an amateur level
Beyond  (OP)

User ID: 79419327
United States
12/14/2020 01:50 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
So today I changed 14 of my passwords. I changed all 14 of these passwords last on November 24th, 3 weeks ago. 5 are emails and the rest are services or message board accounts. I always double check that my passwords are correctly changed and correctly recorded (written on a slip of paper). 4 of those 14 double checked and verified passwords did not work. Only one of those did I use on my phone because I had no choice, obviously that was one of the 4 that were changed by hackers on my phone. I can guarantee that nobody else on the entire planet has held this slip of paper in their hands in the 3 weeks since I wrote the passwords on it. Now, 14 new passwords, new slip of paper. Still, that one password I could only use through my phone. Let's see what happens.

Last Edited by Bankroll on 12/14/2020 01:51 PM
Not anutter cig nature.
Beyond  (OP)

User ID: 78655139
United States
12/20/2020 01:34 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
More clues to tell that your phone is getting hacked.

When you notice your battery draining faster than usual this could be caused from hackers activating your phone software to run processes that help them spy on you.
Not anutter cig nature.
Beyond  (OP)

User ID: 78655139
United States
12/20/2020 01:58 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
So today I changed 14 of my passwords. I changed all 14 of these passwords last on November 24th, 3 weeks ago. 5 are emails and the rest are services or message board accounts. I always double check that my passwords are correctly changed and correctly recorded (written on a slip of paper). 4 of those 14 double checked and verified passwords did not work. Only one of those did I use on my phone because I had no choice, obviously that was one of the 4 that were changed by hackers on my phone. I can guarantee that nobody else on the entire planet has held this slip of paper in their hands in the 3 weeks since I wrote the passwords on it. Now, 14 new passwords, new slip of paper. Still, that one password I could only use through my phone. Let's see what happens.
 Quoting: Beyond


I accidentally compromised the security of my passwords two days ago through a period of 35 minutes. If someone wanted they could have accessed the paper with my passwords on them. I am going to be an optimist about this and give the people around me the benefit of the doubt and believe that the security wasn't compromised. One way or the other I am going to know when I change them once again soon.

I am not perfect like everyone else and am prone to make mistakes. I can confidently say though this was a rare occurence. Last time there was an opportune moment for someone to see my password paper was over seven weeks ago.

Stay safe and protect yourself, keep the people you love safe and protect them with all you got.

Last Edited by Bankroll on 12/20/2020 02:00 PM
Not anutter cig nature.
Anonymous Coward
User ID: 16111192
United States
12/20/2020 02:00 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Malware.
Try to limit access to apps as much as possible.
Ad-blockers are your friend.
Beyond  (OP)

User ID: 78655139
United States
12/20/2020 02:03 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Malware.
Try to limit access to apps as much as possible.
Ad-blockers are your friend.
 Quoting: Shawski


I use Package Disabler Pro. I'm not a techie person so this app is great and user friendly.

Last Edited by Bankroll on 12/20/2020 02:04 PM
Not anutter cig nature.
Anonymous Coward
User ID: 16111192
United States
12/20/2020 02:20 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Malware.
Try to limit access to apps as much as possible.
Ad-blockers are your friend.
 Quoting: Shawski


I use Package Disabler Pro. I'm not a techie person so this app is great and user friendly.
 Quoting: Beyond
Disable storing any information in the cloud as well.
If you can at least. hfhiding
Beyond  (OP)

User ID: 78655139
United States
12/20/2020 03:26 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
Malware.
Try to limit access to apps as much as possible.
Ad-blockers are your friend.
 Quoting: Shawski


I use Package Disabler Pro. I'm not a techie person so this app is great and user friendly.
 Quoting: Beyond
Disable storing any information in the cloud as well.
If you can at least. hfhiding
 Quoting: Shawski


I don't use cloud or backup services and now I keep a handwritten phone book, no chance of hackers deleting my contacts.
Not anutter cig nature.
Beyond  (OP)

User ID: 77623421
United States
01/18/2021 10:34 AM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
QUOTE
Experienced hackers can access a webcam in less than a minute,”
UNQUOTE

Hackers can access your mobile and laptop cameras and record you – cover them up now
[link to theconversation.com (secure)]

Are Hackers Peering Through Your Laptop Webcam?
[link to breakinggov.com (secure)]
Not anutter cig nature.
Beyond  (OP)

User ID: 80253415
Germany
04/16/2021 04:45 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I'm bringing this topic back because my privacy and personal space is still being compromised to the hilt and then an extra inch.

Go ahead and use this thread to share information about how hackers stalk you and invade your privacy and cause other modes of destruction in your life. Share their methods, their tech, their needs, etc. so that we can smarten up and defend ourselves and hopefully counterattack.

Share information on what we can do to protect ourselves and prevent invasion of privacy and stalking. Expand the topic as necessary in order to accomplish a beneficial end for us hard assaulted Americans dangling at the end of a hacker's tech wire.


Here's are links to related threads and site pages.
Android camera bug let hackers spy on users even if phone is LOCKED & screen is OFF
Thread: Android camera bug let hackers spy on users even if phone is LOCKED & screen is OFF

Samsung Patents Smart Contact Lenses With a Built-in Camera
[link to futurism.com (secure)]

SCOUT HIDDEN CAMERA DETECTOR $49.99
[link to www.spyguy.com (secure)]

How to respond to someone else that has your wireless device, LOUIS STYLE!
Thread: How to respond to someone else that has your wireless device, LOUIS STYLE!

Engineering administrative backdoors exist in every device.

This is not bragging. In my own and the careers of others we have learned the backdoors for numerous OS's, SCADA systems [I could pump 10,000 gallons of raw sewage onto Atlantic Avenue in Virginia Beach from this laptop if I chose], or shut down the power to various Naval Shipyard docks in the US.

What matters is that people who will not do that are placed into those positions that could most abuse it.

Even every brand of copier has an backdoor admin account and password. My cat is the background on the touch screen control panel of one gov copier nearest my office in the building I have not worked in for over a year behind COVID.

Does your office have a building security system that reads your ID badge? It also has a backdoor username and password with full admin access; I have them committed to memory. The security scan badges can be imitated with a cell phone utilizing NFC, where do you think they came from?

Perhaps the best lesson here is do not ever lose custody of any device or cell phone you have used and NEVER trade one in for a 'discount' on a new device as a factory reset removes NONE of your information from the device.

Backdoors are tied to the CPU serial numbers so they may be found and accessed and controlled remotely regardless of their name or the network they are on.

I'm simply sharing. Others may use the information as they choose.
 Quoting: Louis in Richmond


Last Edited by Bankroll on 04/18/2021 04:32 PM
Not anutter cig nature.
Beyond  (OP)

User ID: 80253415
Germany
04/16/2021 04:53 PM
Report Abusive Post
Report Copyright Violation
Re: How do spies and hackers invade your privacy, your phone and other devices?
I'm going to press this topic till the cows come home. Important topic, don't let them distract you until it slips out of your mind. Trust me, the more progress you make against them and in your favor the more your quality of life will improve exponentially.
Not anutter cig nature.





GLP