techno.rentetan.com – “Missing” Pixel devices and iPhones are being used by repair technicians to steal money as well as images or data. According to recent allegations, certain Apple and Google service workers have been seen handing over their customers’ mobile devices in order to steal and leak personal data.
Game designer Jane McGonigal has been the latest high-profile victim of a phone hacking scam that intercepted phones taken in for repair before leaking personal data. Apparently, the phone was “lost” at Google’s repair facility, so McGonical purchased a new phone. Several weeks later, the supposedly misplaced phone was exploited to get access to and take images and other private data. On the basis of activity records, McGonigal claims that the thief opened “a number of selfies expecting to uncover nudes.”
This has occurred previously, and it’s not only Pixel owners who have been affected. Several people who responded to McGonigal’s initial Tweet describe similar incidents involving the theft of images, data, and even money from phones that were submitted to Google for repairs. A lady who had nude images taken and shared by iPhone repair staff was awarded a $2 million settlement by Apple in June.
Hopefully, Apple and Google will soon begin enabling US consumers to undertake a larger variety of repairs at home without putting their devices at danger, but for now, sending your damaged phone in the mail or turning it over to a repair expert are the only alternatives for most people. So how can you keep your images, information, and accounts secure from nosy techs, thieves, or anybody else who gets their hands on your phone?
The most apparent preventive action is to keep any sensitive data off of your devices and accounts at all times. That isn’t always possible, however, sadly. All of us have private information stored on our devices that we don’t want others to access. This doesn’t simply apply to pictures of ourselves in bikinis or sending explicit messages to one another.
That’s why it’s important to thoroughly clean and prepare your gadget before sending it in for repairs. Transferring sensitive data into a new location is critical. A local hard disk or an unaffiliated cloud drive are both viable options, as is moving the file from one place to another. Encryption is an added perk! After that, log out of all your accounts and, if you can, execute a system reset.
Your gadget may be broken or previously mailed in, in which case nothing will be done. Make sure you sign into your accounts from a different device and enable two-factor authentication or login alerts, as well as change your password. It’s possible to keep tabs on which of your Google or iCloud-connected devices are actively using your services. You may log out of a smartphone remotely from a browser if you get an unexpected login notification or observe suspicious behavior using Apple’s Find My app or Android’s “Find my Phone” function.
They don’t, however, provide a 100% guarantee: To McGonigal’s credit, they were able to conceal their activities and evade McGonigal’s efforts to hinder them. However, if you keep a watch on your accounts, you may be able to prohibit someone from accessing your data and applications if you notice any suspicious behavior in time.