But, contrary to many people’s beliefs, these companies do not use illegal tactics to capture information such as listening to conversations offline without their consent. The opposite is true: users often allow apps and other connected services to access the camera, microphone, contact list, or GPS. Smartphone.
In some cases, approval is required for some application functionality to work properly. For example, if you do not authorize Instagram to use a microphone, videos captured by Instagram Application Come out without audio. That’s it: he gained access to your microphone even in other situations.
In fact, there are cases where data is collected illegally. For example, when it is hacked. Many devices have already been found without an owner Cell Learn, take pictures, track device location, trigger audio recordings. They are used not only by cyber criminals but also by government officials.
The question was whether the apps actually used the cell phone’s microphone to listen to users unknowingly. Northeast University and Boston University.
For a year, a group of computer scientists tested the 17,000 most popular Android apps, including those from a meta group like Facebook and Instagram. WhatsApp. They also analyzed whether these services sent information to the social network.
End? There is no evidence that these apps use the microphone to record or send audio without the user’s permission.
To test the question, the researchers used ten cell phones equipped with a program that automates human interactions. He recreated conversations about consumer preferences so that the device’s microphones would pick them up. At the end of the study, they found no evidence that the recordings had been made.
There is only one guarantee when you are online: some companies will try to figure out what you are doing. Leticia A., a data scientist, says that when you show that you like a product or service on the Internet, ads about it start following you on various platforms. Posa explains.
“Retargeting” is a tool widely used by ads to generate sales for a product you are already interested in.
When you click on something associated with this technology, you leave a path of your digital identity associated with that product.
This tracking happens at a high frequency. Pose Example:
When accessing a website, purchasing, registering, liking a kitten’s photo, driving a car with GPS, commenting on your mother’s photo, accessing a location, accessing Wi – Fi, paying a bill … this is all the information you transfer.
Scientists at Northeastern University and Boston University have expressed interest in pointing out that their research may not be the answer to this question. They omitted that cellphone microphone.
Musicaholic. Twitter guru. Total bacon fanatic. Zombie ninja. Freelance student. Coffee fan. Gamer.