in my limited experience with mobile phones ("m.p."), it appears that m.p. security generally consists of two parts:
a. the front end or physical access to the device; and
b. the back end or electronic, remote access to the device.
* * * *
"a" appears reasonably protected at present by encryption software.
"b" however, appears subject to a variety of vulnerabilities not the least of which includes something now called "data leakage" or "privacy invasiveness."
a recent report, link below, by the m.p., enterprise security firm, Appthority reports this current problem as extensive across the m.p., environment.
https://www.appthority.com/enterpri...ws-high-risk-to-enterprises-from-mobile-apps/
apparently, data leakage (contact lists, etc.) are harvested by mainstream legitimate applications; and then the information is used against the m.p. owners.
appthority is not a disinterested party since it engages in the business of protecting enterprise organizations against such risks.
i would hence appreciate comments here from disinterested m.p., users as to whether they consider this risk significantly greater in quality and quantity than the risk of data leakage and privacy invasiveness currently affecting personal computers? thanks.
a. the front end or physical access to the device; and
b. the back end or electronic, remote access to the device.
* * * *
"a" appears reasonably protected at present by encryption software.
"b" however, appears subject to a variety of vulnerabilities not the least of which includes something now called "data leakage" or "privacy invasiveness."
a recent report, link below, by the m.p., enterprise security firm, Appthority reports this current problem as extensive across the m.p., environment.
https://www.appthority.com/enterpri...ws-high-risk-to-enterprises-from-mobile-apps/
apparently, data leakage (contact lists, etc.) are harvested by mainstream legitimate applications; and then the information is used against the m.p. owners.
appthority is not a disinterested party since it engages in the business of protecting enterprise organizations against such risks.
i would hence appreciate comments here from disinterested m.p., users as to whether they consider this risk significantly greater in quality and quantity than the risk of data leakage and privacy invasiveness currently affecting personal computers? thanks.