Vanish

Time flies like an arrow - Fruit flies like a banana

Securing your Android

It’s not just hackers is it. A friend recently lost their phone. Despite all that I’ve ever said, it was not encrypted. Why. Because it’s too big a headfuck. No one thinks twice about double or triple locking their house doors. It’s a once a day action – np. But because they spend most of their life using their mobile, well, I guess it’s just too hard. Too big a hassle. It takes that few extra seconds to do the stuff that is so important. I did have some advice for my friend –  I told them “stiff shit”! You insure your house/contents/car without a second thought. It’s easy. Pay the bill, job done. Securing your info on a mobile is a constant process. It’s not a once of “wham-bam-thank you ma’am” action. So what do you do? YOU CHEAT! You don’t encrypt or you are selective in how you do it. And you eventually pay the price.

How much would you pay to get your phone back? The few extra seconds it takes to secure it, or the money you may lose when someone starts using all your bullshit paywave apps. Or worse! Well I’m sorry, but it doesn’t work that way. You can lock the barn door after the horse has bolted, but it’s too late. Secure your phone now. I’m sure that fkn twitter or snapchat or instagram can wait a few seconds for your contribution.

Smartphones compete over which can best secure your secrets. They encrypt your data, store the digital keys to unlock themselves on specialized hardware, and even offer fancy biometrics. But many millions of smartphones remain open to an absurdly low-tech attack: a sly glance at someone’s phone while they unlock it. One new study has quantified just how easy an Android-style unlock pattern is to hack.

Take Baby Steps Toward Encryption By Securing Your Smartphone
With data like your credit card information, passwords, embarrassing messages, and even more embarrassing photos, encrypting the data on your device keeps your most personal information secure by essentially scrambling it. Encryption makes it incredibly difficult, if not impossible, for hackers to force their way into your device with methods like brute force attacks (attempting every possible password combination).

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme