this post was submitted on 23 Jun 2023
72 points (100.0% liked)

Technology

37738 readers
428 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

Interesting to hear such things discussed at that level. Turning it off is suggested to get rid of compromised background processes that might be spying on users. Obviously, this only help against malware that isn't permanently installed on a phone.

you are viewing a single comment's thread
view the rest of the comments
[–] distractedcactus@beehaw.org 28 points 1 year ago (3 children)

This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you're doing is delaying or temporarily interrupting any data collection that's going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you're better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you're relying on for "security".

[–] cark@beehaw.org 11 points 1 year ago (1 children)

That is not true. Many attacks (e.g. the recently revealed Operation Triangulation) do not have persistence.

[–] aranym@lemmy.name 5 points 1 year ago

Yup, a lot of very sophisticated mobile malware does not have persistence. His advice holds up.

load more comments (1 replies)