The most direct physical method is to implant a tracking chip in the victim's mobile phone based on physical/hardware eavesdropping.
Many micro tracking chips are based on Nano SIM cards. Nano SIM card is a card commonly used in our mobile phones, so some intruders like to use it very much.
nano-SIM card is also called the fourth form element integrated circuit board . It is smaller than the Micro-SIM card. Its area is only 60% of the first-generation SIM card. Its specific dimension is 12mm x 9mm, and its thickness is also reduced by 15%. The nano-SIM card aims to replace micro-SIM cards installed on iPhones, with smaller sizes that will free up space for increased memory and larger battery and denser motherboard arrangements.
Based on pseudo-base station eavesdropping
maliciously interferes with nearby base stations and force downgrades mobile phone communications in a certain area to 2G (GSM). At this time, the intruder can decode and listen on mobile phone communications.
Eavesdropping on application-level
To put it bluntly, it is an APP in the form of commercial undercover. Many people think that iPhone phones are highly secure and not easy to get involved. The answer is no. Advanced undercover software can also be undercover Apple , and can also view all the data on your phone and even more.
This APP can be implanted through WiFi.
Driver-based eavesdropping
is also used as a driver eavesdropping component, which is loaded together with the operating system when loading, but the higher the phone, the greater the implementation of this situation.
Control from mobile phone manufacturers
This kind of thing is incredible to many people. In fact, it depends on whether the manufacturer is willing or not. Apple 's tampering with the iPhone is a living example?
Eavesdropping based on the surrounding environment of the mobile phone
What does this mean? It means not eavesdropping on the phone, but eavesdropping on accessories related to the phone, such as charging heads with eavesdropping/candid shots.
How to solve the problem when the mobile phone is monitored?
There are some well-known tips on the Internet. If you don’t know yet, hurry up and take a look.
1. Restore factory settings
2. Use mobile phone antivirus software
3. Flash
and the above three are very common ways to solve the monitoring of mobile phones. Take factory settings as an example. This trick is the biggest move for mobile phones to solve software failures and system failures. As long as the factory settings are restored, all the APPs installed on the phone will be wiped out. Ordinary virus software and rogue software will be cleared.
4. Find a professional to deal with it (test the device and report it)
Find a professional to remove the monitoring risks is the most correct step. There are many ways to solve mobile phone monitoring on the Internet: change the phone, shut down, and restore the factory settings, but Brother Mao wants to talk about advanced mobile phone monitoring. Even if the battery is removed and the factory settings are restored, it cannot ensure that the risk of infringement can be eradicated. The data has been mastered by the intruder in real time. Professionals can only prescribe the right medicine.