6 Tips for Smartphone Privacy and Security
Computer forensic expert Ronald Kaplan thinks you should stop using your smartphone if you want privacy in today's digital world.
Tue, February 11, 2014
CSO — In the digital world, things are getting worse rather than improving with regard to the populist quest for personal privacy and security. Our smartphones track wherever we go, what we say, who we say it to, our likes and dislikes, and when we are playing games instead of working. Our computers track and record the same types of information day in and day out.
These are the types of information marketers, insurance companies and employers would love to know before engaging with us, which means the information has great value. This should be troubling to all who read it. You may not be capable locating this often buried information on your own device, but rest assured trained specialists certainly can.
This is the type of information lawyers used to only dream about. They use it to devour the credibility of their foe under testimony. The racist or sexist jokes, the email between you and someone you testified you don't know, the evidence that you could not be in two places at one time, transfer of assets you testified you did not have, bank transactions you denied having, and the list goes on and on.
Just get sued or arrested and you will find out how easy it is to get to this information. We are not talking about NSA snooping which we all recently learned is more prevalent, pervasive and comprehensive than anyone imagined. What we are talking about here falls under decades old standards for discovery in civil and criminal litigation which are very difficult, or impossible, to stifle. These electronic discovery standards are already well established in civil procedure and what is referred to as case law.
If this concerns you then all you can do to protect yourself from this invasion is to stop using that smartphone and that computer you currently use almost round the clock. Sure you will have to live without all the conveniences in banking, travel, photography, and entertainment but you will know your private information and personal habits and activities will much more likely remain private. It is a very personal choice of whether the benefits outweigh the drawbacks, however most people never contemplate the tradeoffs, they just slide into embracing their electronic devices and pursue every app or application that meets their fancy or needs.
Many technology users have already been bitten by the likes of malware, computer virus, snooping software, and keyboard captures. Some have had to absorb the loss of a hard drive as a result of these invasions. Recovery is frequently achieved only by replacing the afflicted media or the entire device and restoring from any backup they may have maintained.