I am saying the above statement with boldness, this statement does not just
come to my mind out of nowhere but it is one that really puts together a lot of
research I have personally done into one sentence and now as I am breaking it
bit by bit for you too to absolve it. This article consists of a research I
have done and even quoted from what top government agents in the United States of
America do to be secure while using any gadget.
One of the people who made me question our use of mobile
devices and laptops too is James Comey the FBI Director. The man said that
whenever he uses any of his gadgets, he must cover the webcam as a security
protocol. This brings into my mind the question, “if he does it, shouldn’t we
be doing it too?” You may never know who is spying on you through that camera
since us all as general phone users give access to so many apps that we install
in our phones and software and programs we run in our computers. They request
for permission to access functions in your gadgets and we readily allow them to
do so. Social apps like twitter, whatsapp and the rest have access to your
device cameras and not only the cameras but also the microphone.
This means that your daily activities can be monitored at
any time that you are using your device, your conversations on your device or
out of your device will also be listened to. Do not look startled at this yet,
this is just a little bit of what depth technology has invaded our private life
and exposing it slowly but surely.
There has been a recent move by government in many
countries of the world to install cctv cameras in all streets of a city. This
move has just one main motive which is to monitor us, the civilians. You must
be aware of this that you are almost been watched every moment and step. This
is how criminals are caught since the government security agents like CIA, FBI,
DEA, NSA, Secret Service and others have access to these cameras.
The satellites which are been sent in outer space also
have very strong resolution cameras. They are used to spy on terrorist camps
while the terrorists are not aware anyone knows the whereabouts of their camps
but little did they know that the government does.
Hackers are on the rise too and are always using many
different techniques to access your information so that they can steal from
you. The money we store in online wallets is not safe at all. Even if the
account will not be jail breached, the hackers can be able to easily get your
log in information by capturing your keystroke, screen or by obtaining your
email and using a key logger or password generator to determine your password.
One of such a technique is known as phishing. Theses hackers mainly use
different hardware and software or even code programs which are designed to
perform specific functions forcefully.
We are not safe at all. I wanna tell you that it is
always advisable to tape your webcam at any time you are using your device. If
top government security agents in the FBI, CIA, Secret Service and others do
the same by covering their cameras with a tape, why should you not do it…? This
is one of the security protocols that you should take seriously if you want to
be on the safe side. Just this is not enough since there is already so much
information about you which is in the hands of giant online companies like
Google, Facebook, twitter and the rest. They have access to your information
whenever they feel like since while installing their apps, you gave them access
to your contacts, gallery, camera, microphone and almost all of your devices
important functions.
0 Comments