Go | New | Find | Notify | Tools | Reply |
Minor Deity |
https://techcrunch.com/2023/03...chips-flaws-android/ Google publicly warns about severe security flaws in Samsung chips, claiming that the flaws can be exploited without user interaction, that merely knowing the phone's number is enough to let a hacker exploit the flaws. It's the modem's baseband processing unit.
| ||
|
Has Achieved Nirvana |
As a friend remarked the other day: “Samsung should stick to making phones.” And
| |||
|
Has Achieved Nirvana |
My television is Samsung. Neither the Comcast remote or the Roku remote will work with it. From googling Samsung seems to be the worst with this problem. Samsung custormer service is also poor.
| |||
|
Has Achieved Nirvana |
Mr wtg has a bottom of the line Samsung phone; it's not on the list of ones with a chip issue. If it was and we had to switch off wifi calling, we'd be in trouble because the cellular signal in our neighborhood is totally awful. We have three Samsung TVs with Comcast and Roku, and they all play nicely with each other. I'm a pretty good troubleshooter and my consulting fees are reasonable for anyone who might need assistance...
| |||
|
Has Achieved Nirvana |
| |||
|
Minor Deity |
The security flaws are in the Exynos modem chips that handle the cellular function. Turning off the cellular function and keeping all your calls and data on Wi-Fi will actually protect you from these security flaws.
| |||
|
Has Achieved Nirvana |
Out of my technical wheelhouse here and I only skimmed the article...why does Google say this? (from the article)
| |||
|
Has Achieved Nirvana |
Oh. It does affect phones. Lots of phones, apparently. But I wonder why anyone would hack a phone. What would be the point? Is there data on a phone that can be resold? I wonder the same thing about WiFi. My SIL-the IT-guy thinks my WiFi password is too weak. If someone guesses it, what can they do with it?
| |||
|
Minor Deity |
Has to do with “voice over IP” that at some level unifies “voice carried as data over Wi-Fi” and “voice carried as data over cellular.” Google managed to narrow the problem down to certain “voice over IP” functions rather than implicating the entire modem baseband function (which was my old, not apparently wrong and outdated, reading at the time). Had it still been the entire (cellular) modem baseband function that’s implicated, then switching the entire cellular function off would have been one way to avoid the security vulnerabilities.
| |||
|
Has Achieved Nirvana |
In theory (and I don't know whether this is true in the real world), anyone who can penetrate your WiFi network can see all the URLs you look at and everything you send out and receive ... including passwords, banking information, etc. Whether that's true in an https environment, well, that's where my knowledge stops. I should probably know these things. | |||
|
Has Achieved Nirvana |
| |||
|
Has Achieved Nirvana |
Here's what the FTC says:
https://consumer.ftc.gov/artic...e-what-you-need-know | |||
|
Has Achieved Nirvana |
My banking sites all require two-step authentication these days. Does that help solve the problem?
| |||
|
Has Achieved Nirvana |
For your weak password...used to be people would drive around neighborhoods and look for wifi signals. Lots of people didn't change the factory password or the SSID, so it could be pretty easy to guess the password and get access to the network in your house. Of course over time people automated the password guessing part. So the stronger the password, the less likely you'll get hacked. Another option is to turn off the broadcasting of your SSID so other people can't see the name of your network. https://www.lifewire.com/disab...eless-routers-816569 Then there were the people who monitored unsecured networks in public places and were able to intercept traffic. I think what the article is saying is that more websites use encryption, which makes it harder to sneak a peek at what people are doing. I tend not to look at the lock symbol in my browser, except when I go to a new site that I haven't visited before. For more about encryption, check out HTTPS Everywhere: https://www.eff.org/https-everywhere Even two-factor authentication isn't bullet-proof. There's SIM swapping: https://us.norton.com/blog/mobile/sim-swap-fraud At the end, we are left with... https://www.youtube.com/watch?v=JW5bcI0ADCY
| |||
|
Powered by Social Strata |
Please Wait. Your request is being processed... |