this post was submitted on 23 Jun 2023
0 points (NaN% liked)

Technology

37693 readers
426 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

Interesting to hear such things discussed at that level. Turning it off is suggested to get rid of compromised background processes that might be spying on users. Obviously, this only help against malware that isn't permanently installed on a phone.

all 8 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 1 year ago

As if any spyware worth it's salt didn't install itself as service with an innocuous name. Something like "Facebook" or "TikTok".

[–] [email protected] 0 points 1 year ago (1 children)

This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you're doing is delaying or temporarily interrupting any data collection that's going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you're better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you're relying on for "security".

[–] [email protected] 1 points 1 year ago

That is not true. Many attacks (e.g. the recently revealed Operation Triangulation) do not have persistence.