Connect with us

Tech

Leaked Conversations on Facebook: The Complexity of Phone Tapping

Published

on

Leaked Conversations on Facebook: The Complexity of Phone Tapping
Image source: Defi Media

In an age where privacy is increasingly compromised, the issue of phone tapping has gained significant attention. Loganaden Velvindron, a cybersecurity expert from CyberStorm, clarified that such surveillance is not easily accessible to the average person. According to Velvindron, phone tapping can be conducted remotely, and sophisticated techniques—like network cloning and the installation of spyware—are used to intercept communications.

These methods are not just ordinary technical tricks; they require considerable expertise and substantial financial investment, making them both challenging to detect and hard to prevent.

Leaked Conversations on Facebook: The Complexity of Phone Tapping

“Phone tapping typically demands advanced technical resources and significant funding,” explained Velvindron.

He pointed out that the equipment necessary for surveillance is not readily available to the general public. “Setting up such a system is no straightforward task,” he added.

The devices used for phone tapping are typically sold only to specific clients, making it difficult for the unwitting individual to recognize if they are being monitored.

“To tap someone’s phone, one usually needs to be in close proximity to the target,” Velvindron explained.

This proximity allows the perpetrator to trick the target’s phone into connecting to a network that mimics that of their mobile service provider through a technique known as cloning.

Once this connection is established, the interceptor can easily listen in on the person’s conversations, whether voice calls, video chats, or even text messages.

There are also alternative methods for conducting phone taps, but this requires even greater investment.

Another approach discussed by Velvindron is the installation of spyware on a target’s device, which effectively hijacks the phone.

This advanced system can exploit vulnerabilities in the device, allowing the spyware to record calls and messages.

“Few people have the financial means to acquire such systems; they are definitely not within reach for the average person,” he asserts.

Moreover, Velvindron noted that phone taps can even be initiated from abroad, further complicating the surveillance landscape.

How to Protect Yourself

To safeguard against malicious phone tapping, Velvindron recommended keeping your mobile device updated.

“When your device stops receiving security updates, it’s time to consider replacing it,” he advised.

Unfortunately, he observed that many people in Mauritius only switch their devices once they are broken or beyond repair, whereas a refresh every two to three years—depending on the brand—would be more prudent.

He also emphasized the potential of using alternative applications beyond conventional messaging platforms like WhatsApp.

“CyberStorm suggests using Signal, which offers a more advanced encryption system known as Post Quantum Resistant Encryption,” he explained.

While WhatsApp is working towards implementing similar measures, it does not currently support this level of encryption.

For those suspecting their phone may have been compromised, Velvindron encouraged contacting CyberStorm for an assessment. Individuals seeking further advice and information can also visit CyberStorm’s Facebook community page for additional resources.

Source: Defi Media

Spread the News
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *