就业创业,二线城市也是重要选择
百度 近年来,车险市场以高费用为手段开展恶性竞争问题尤为突出。
Security in mobile devices. Issues concerning regular cellphones, smartphones, tablet computers and other portable information devices all fit into this category. If your question is specific to one of the following, use it instead: [phone], [smartphone], [iphone], [ios], [windows-phone], [android].
1,080 questions
0
votes
0
answers
52
views
Is it possible to ring someone from someone elses phone number [closed]
I was just sitting opposite my mother in a pub and my phone starting ringing with her number phoning me, her phone was locked in her bag and showed an outgoing call to me. Also showed an incoming call ...
1
vote
1
answer
99
views
How do I safely backup data and secure my accounts when my phone has been compromised?
I have good reason to believe that either the google account I use on my work phone, or the phone itself has been hacked (phone password changing, strange errors and malfunctions, google prompting me ...
1
vote
1
answer
82
views
Is Android Keystore/iOS Keychain without biometric authentication still secure against physical access attacks?
I'm implementing refresh token storage in a mobile app and trying to understand the practical security differences between these two approaches:
Option 1: Hardware-backed storage WITHOUT biometric ...
1
vote
0
answers
65
views
How secure is COMP128-2/3 algorithm against SIM cloning? [migrated]
I am currently doing research on mobile network security with a focus on SIM card cloning.
I found out that 2G originally used the COMP128-1 algorithm, which is cryptographically broken and the secret ...
1
vote
0
answers
100
views
Should I restart or power off/on a phone to clear malware in volatile memory? [closed]
Several sources claim one should power off and on mobile devices weekly. While the effect on overall security might be minor it should (among other things) clear temporary files where malicious code ...
0
votes
1
answer
128
views
How to stop a mobile operator from using a dial tone that indicates I am in a different country? [closed]
When I travel abroad, people who dial my (British) mobile number hear a calling tone different to what they would have heard if I am home. I do not want everyone who calls me to know I am unlikely to ...
2
votes
1
answer
694
views
How to protect web app against login CSRF while also allowing mobile app/curl to access REST API?
I am using Django REST framework.
I want a single API for all of my clients (web, mobile, curl).
I understand that I need to include a CSRF token in requests originating from the web client, to ...
6
votes
4
answers
3k
views
Whatsapp vs SMS+cell calls
I'm in a country where WhatsApp is "default" messaging app.
I am thinking about deleting my WhatsApp account completely and sticking to the cell calls and SMS.
I, of course, understand that ...
4
votes
2
answers
241
views
Integrating Biometrics with Auth Code Flow (w/ PKCE) on mobile
There is a topic I have been going back and forth with for some time. Here is the premise:
we need to create a mobile app for a highly regulated industry
the app should leverage oAuth2 for obtaining ...
2
votes
2
answers
178
views
Using an Android phone for the airgapped GPG key signer
Several people recommend only decrypting your master key on an airgapped computer to reduce the risk of having malware that can steal it. What about using an Android phone for this purpose? One could ...
3
votes
1
answer
162
views
How to securely change email address in a Mobile App with Email OTP Based Login
I'm working on a mobile app where users can only log in using their email address and receive an OTP to verify their identity. I'm trying to figure out the best approach for allowing users to change ...
1
vote
0
answers
85
views
Remote control the microphone of a feature phone [closed]
Let us consider the Nokia 222 and Nokia 100 feature phones. The phones never connected to the internet and no additional software was installed on them. It can safely be assumed that nobody had ...
4
votes
1
answer
1k
views
(How) is it possible to let portable communication devices detonate via software? [closed]
A recent attack in the Middle East turned pagers into weapons; apparently, the attacker was able to let them detonate without physical access to the devices, at least not after the victims obtained ...
2
votes
4
answers
2k
views
HTTPs compression, CSRF and mobile apps
I have a backend for a mobile application that has to serve large JSON responses from time to time, the transfer would be greatly helped by enabling compression, especially when the user has bad ...
0
votes
1
answer
164
views
Can we catch signals from a cellphone using AI to interpret the encrypted data?
Would it be possible for someone to steal EM waves from our mobile devices to listen to our conversations or get our OTP?
Whatever encryptions they have they are just EM waves. Based on the patterns ...