Binance Square

androidsecurity

5,715 views
3 Discussing
MISTERROBOT
ยท
--
๐Ÿ’ฅ Every Android is under full control โ€” a leak of 12k documents revealed how intelligence agencies read Telegram and Chinese messengers The largest leak from the Knownsec archive (โ‰ˆ12,000 documents) showed what many were afraid to think out loud: mobile tools of intelligence agencies can extract messages directly from Android devices. What is important to know โ€” and why it concerns each of us ๐Ÿ‘‡ ๐Ÿ”Ž The mobile component for Android stands out, capable of extracting message history from Chinese messengers and Telegram. Read between the lines: โ€” Your "deleted" messages do not disappear anywhere. โ€” Telegram effectively moves data from one database to another under the guise of deletion. โ€” This data remains on the device in encrypted form โ€” but not forever. โ€” Through deep analysis, specialists can retrieve everything (even what you deleted a month ago). โ€” Plus: chat logs are stored on Telegram servers โ€” specialists may have direct access to them if needed. โš ๏ธ The conclusion is simple and harsh: deletion is an illusion; anonymity is marketing. #Privacy #AndroidSecurity #Telegram #InfoSec {future}(TONUSDT)
๐Ÿ’ฅ Every Android is under full control โ€” a leak of 12k documents revealed how intelligence agencies read Telegram and Chinese messengers

The largest leak from the Knownsec archive (โ‰ˆ12,000 documents) showed what many were afraid to think out loud: mobile tools of intelligence agencies can extract messages directly from Android devices.

What is important to know โ€” and why it concerns each of us ๐Ÿ‘‡

๐Ÿ”Ž The mobile component for Android stands out, capable of extracting message history from Chinese messengers and Telegram.

Read between the lines:
โ€” Your "deleted" messages do not disappear anywhere.
โ€” Telegram effectively moves data from one database to another under the guise of deletion.
โ€” This data remains on the device in encrypted form โ€” but not forever.
โ€” Through deep analysis, specialists can retrieve everything (even what you deleted a month ago).
โ€” Plus: chat logs are stored on Telegram servers โ€” specialists may have direct access to them if needed.

โš ๏ธ The conclusion is simple and harsh: deletion is an illusion; anonymity is marketing.

#Privacy #AndroidSecurity #Telegram #InfoSec
ยท
--
What Happens If Your ADB Port Is Open? | Hidden Hacking Threat! Did you know your Android phone may have a secret backdoor open? Itโ€™s called the ADB Port (5555) โ€” and hackers love it! ๐Ÿ› ๏ธ ADB (Android Debug Bridge) lets developers: Transfer files Install/uninstall apps Access system shell But if someone runs: adb tcpip 5555 ADB goes into WiFi mode, exposing port 5555 to the local network. โš ๏ธ What Can Hackers Do? If you're on the same WiFi as a hacker, and ADB port is open, they can: Connect to your phone: adb connect your_ip:5555 Pull all your files Access camera/mic Reboot your phone Install malware silently ๐Ÿ” How to Check: Go to: Settings > Developer Options > Wireless Debugging Or use: nmap -p 5555 [device_ip] ๐Ÿ›ก๏ธ Stay Safe: Turn off Wireless Debugging when not needed Avoid using Developer Mode on public WiFi Disable ADB over WiFi: adb usb Avoid shady apps with ADB-related permissions ๐Ÿ” ADB Port = An open door If the door's open, someone will walk in. Be aware, stay protected. #CyberSecurity #AndroidSecurity #TechAwareness #MobileSecurity #Binacefeed
What Happens If Your ADB Port Is Open? | Hidden Hacking Threat!

Did you know your Android phone may have a secret backdoor open?
Itโ€™s called the ADB Port (5555) โ€” and hackers love it!

๐Ÿ› ๏ธ ADB (Android Debug Bridge) lets developers:

Transfer files
Install/uninstall apps
Access system shell

But if someone runs:
adb tcpip 5555
ADB goes into WiFi mode, exposing port 5555 to the local network.

โš ๏ธ What Can Hackers Do?

If you're on the same WiFi as a hacker, and ADB port is open, they can:

Connect to your phone:
adb connect your_ip:5555

Pull all your files
Access camera/mic
Reboot your phone
Install malware silently

๐Ÿ” How to Check:
Go to: Settings > Developer Options > Wireless Debugging

Or use:
nmap -p 5555 [device_ip]

๐Ÿ›ก๏ธ Stay Safe:

Turn off Wireless Debugging when not needed

Avoid using Developer Mode on public WiFi

Disable ADB over WiFi:

adb usb

Avoid shady apps with ADB-related permissions

๐Ÿ” ADB Port = An open door
If the door's open, someone will walk in. Be aware, stay protected.

#CyberSecurity #AndroidSecurity #TechAwareness #MobileSecurity
#Binacefeed
Login to explore more contents
Explore the latest crypto news
โšก๏ธ Be a part of the latests discussions in crypto
๐Ÿ’ฌ Interact with your favorite creators
๐Ÿ‘ Enjoy content that interests you
Email / Phone number