this post was submitted on 08 Apr 2026
-29 points (10.8% liked)

linuxmemes

30984 readers
1077 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     

    @linuxmemes how can mobile phones possibly get hacked ?? I mean we use Android or iOS phones, which are pretty much secure, right ??πŸ€”πŸ€”πŸ€”

    top 19 comments
    sorted by: hot top controversial new old
    [–] bjoern_tantau@swg-empire.de 14 points 14 hours ago* (last edited 43 minutes ago)

    Sir, this is a ~~Wendy's~~ memes community.

    Although the amount of bad punctuation and emoticons might shift this into shitpost territory.

    [–] undefinedTruth@lemmy.zip 19 points 16 hours ago* (last edited 16 hours ago) (2 children)

    The only way to make a digital device 100% secure is by using a hammer.

    [–] FilthyHands@sh.itjust.works 6 points 15 hours ago (2 children)

    I was told by a professor that launching it into the sun is the only way to make sure.

    [–] Cosmonaut_Collin@lemmy.world 4 points 10 hours ago

    The only true secure way is to go back in time and stop the device from ever being created so no.one thinks to go back in time to stop you from throwing it into the sun. You may have to kill yourself though as you will be the only person who is aware of a phone that could have existed, if we are working with branching timeline theory.

    [–] Zron@lemmy.world 2 points 9 hours ago

    It’ll take months to get something to the sun. Better to bring the sun to it and vaporize it with Oxy Acetylene

    [–] hydroptic@sopuli.xyz 5 points 16 hours ago (1 children)

    Even that might not do it, if you don't make sure you get the SSD chips (or spinny disks depending on what the device is)

    [–] savvywolf@pawb.social 2 points 9 hours ago (1 children)

    Even then, it's possible that there may be small embedded circuits inside the camera with the sole purpose of constantly recording and sending that data who knows where.

    You know, if you want to go full tinfoil hat.

    [–] hydroptic@sopuli.xyz 1 points 9 hours ago

    Oh yeah, absolutely true.

    Wonder if microwaving a device would be an easy way to make sure all the data storage is truly dead? Well, short of completely pulverizing it anyhow

    [–] LodeMike@lemmy.today 10 points 16 hours ago (1 children)
    [–] codewizard@hear-me.social 0 points 16 hours ago (4 children)

    @LodeMike isn't a mobile phone supposed to be safer than a computer ??πŸ€”πŸ€”πŸ€”

    [–] LodeMike@lemmy.today 11 points 16 hours ago

    Yes but there's always bugs and some of those bugs lead to privilege escalation. Phones mostly just remove the "user clicked yes on the root access prompt" attack. And other attack surface reductions.

    [–] DmMacniel@feddit.org 5 points 15 hours ago (1 children)

    mobile phones yes, smartphones (android, iOS) no. They are riddled with backdoors.

    [–] codewizard@hear-me.social -2 points 15 hours ago (1 children)

    @DmMacniel and what are those backdoors ??πŸ€”πŸ€”

    Can't we shut them down ??πŸ€”πŸ€”πŸ€”

    [–] DmMacniel@feddit.org 1 points 14 hours ago

    Ask CIA and other Secret Agencies :)

    [–] Onomatopoeia@lemmy.cafe 4 points 15 hours ago

    Depends on the computer.

    [–] terabyterex@lemmy.world -1 points 13 hours ago

    Quite the opposite. Every single text message you send inside the j ited stayes is saved by both the us and the chinese government. This is why you have to use signal.

    Also, if you connect to a stingray device then no hope of privacy

    [–] Kolanaki@pawb.social 6 points 14 hours ago

    Nothing is 100% secure.

    [–] emotional_soup_88@programming.dev 4 points 15 hours ago* (last edited 15 hours ago)

    I hate what popular culture has done with our perception of hacking. Hacking almost always involves social engineering as a means to open a backdoor into a system: you trick the end user into for instance giving up login credentials or installing a program that "phones home" to a command and control center. You'll have to research the details on your own, but depending on what information has been "phoned home" or in other ways acquired by the adversary (login credentials, IP address, hardware and software identifiers, etc.), the adversary can then deploy further tools that either exploit known programmatic vulnerabilities or that elevate the adversary's privileges on the target system, with the goal of attaining enough control to do whatever the objective was in the first place (gathering PII, bank info, leaking private media, distortion, what have you...).

    Android is great at a very specific task, which is to isolate processes into something I can't seem to recall right now... Maybe "zygotes"? Basically it gives the user granular control over interprocess communication. It also effectively reduces attack surface by isolating infection/damage.

    On Windows, for instance, programs are allowed to elevate their own privileges - for the convenience of the end user, I suppose - which is of course INSANE, considering that the greater Windows user base probably don't have the cyber hygiene required to operate safely within those premises.

    I'm too sleepy to go on, but "google" and read: hacking, backdoor, exploit, social engineering, privilege elevation

    [–] NotEasyBeingGreen@slrpnk.net 1 points 15 hours ago

    If it unlocks with a simple pattern, if you use a unlock code that someone can guess, and so on.

    Or did you mean remotely?