Tracking a phone and reading their messages - this app should be illegal!

Liron Segev
13 May 202312:39

TLDRThe video script discusses the dangers of spyware and tracking apps, detailing how they can be installed on a phone to monitor messages, photos, and location in real-time without the user's knowledge. It provides a step-by-step guide on how to check for and prevent such invasions of privacy, including disabling Play Protect, checking for unknown app installations, scrutinizing apps with suspicious permissions, and monitoring data and battery usage. The video also highlights the importance of being vigilant about location sharing and using tools like Tracker Detect to identify nearby tracking devices.

Takeaways

  • 🕵️‍♂️ Installing a spy tracking app on a phone can be done in just 15 seconds, granting access to messages, pictures, and real-time location.
  • 🔍 The software remains invisible on the device unless one knows where to look, making it a significant invasion of privacy.
  • 🛡️ To protect against such intrusions, ensure that 'Play Protect' is enabled in your phone's settings, as it prevents malicious apps from being installed.
  • 🔧 Check the 'Install unknown apps' setting to see if any app has been given permission to install apps from sources other than the official app store.
  • 👀 Review the list of apps installed on your phone and verify their legitimacy, especially those you don't recognize.
  • 🚫 Be wary of apps that request permission to display over other apps, as this can be a sign of spyware.
  • 🔋 Spyware apps are often battery-intensive; monitor battery usage to identify apps that consume an unusually high amount of power.
  • 📱 Special app access settings can reveal if certain apps have permissions they shouldn't, like 'all file access' or 'Wi-Fi control'.
  • 💻 Regularly check the list of apps with access to your location to ensure that only necessary apps have this permission.
  • 📈 Monitor data usage to identify any sudden spikes, which could indicate unauthorized data transmission by spyware.
  • 📍 Use a dedicated app like 'Tracker Detect' to scan for nearby tracking devices, such as AirTags, to further protect your privacy.

Q & A

  • How long does it typically take to install a spy tracking app on someone's phone?

    -It takes only 15 seconds to install a spy tracking app on someone's phone.

  • What kind of information can a spy tracking app access on a targeted phone?

    -A spy tracking app can access every message, picture, track the phone's location in real time, web history, keystrokes, email addresses, passwords, and even take screenshots of the phone screen.

  • Is the spy tracking software visible on the infected phone?

    -The spy tracking software is invisible on the phone unless you know where to look.

  • What is the first step a creep would need to take to track your phone?

    -To track your phone, someone would first need physical access to your device.

  • How can you check if Play Protect is enabled on your phone?

    -You can check if Play Protect is enabled by going to settings, searching for 'Play Protect', and looking to see if the option is turned on.

  • What does installing unknown apps permission mean?

    -Allowing installation of unknown apps means that you permit the installation of apps from sources other than the official app store, which can be a security risk.

  • Why are spyware apps usually very battery heavy?

    -Spyware apps are battery heavy because they constantly run in the background, tracking GPS location, and sending texts, messages, and photos back to the server.

  • How can you identify potentially malicious apps that are allowed to display over other apps?

    -You can identify potentially malicious apps by checking the list of apps allowed to display over others and looking for names that seem suspicious or unrelated to their apparent function.

  • What should you do if you find an app with permissions that seem unnecessary or suspicious?

    -If you find an app with unnecessary or suspicious permissions, you should disable those permissions or, if unsure, search online to determine the legitimacy of the app.

  • How can you detect if someone is using an air tag to track your location?

    -You can download a free app called 'Tracker Detect' from the Google Play Store, made by Apple, which scans for air tags near you and alerts you if any are found.

  • What is the importance of regularly checking app permissions and settings?

    -Regularly checking app permissions and settings helps ensure your privacy and security by allowing you to identify and disable unnecessary or suspicious access that could be indicative of spyware or other malicious activities.

Outlines

00:00

🕵️‍♂️ Spyware Dangers and Installation Process

This paragraph discusses the ease with which spyware can be installed on a phone, allowing unauthorized access to personal information such as messages, pictures, and location. It emphasizes the invisibility of such apps and the invasion of privacy they represent. The speaker provides a step-by-step guide on how to reverse the installation process, highlighting the importance of physical access to the device, disabling Google's Play Protect, and checking settings for the permission to install unknown apps.

05:02

🔍 Identifying and Managing Suspicious Apps

The focus of this paragraph is on identifying suspicious apps on a phone. It explains how to check for apps that are allowed to display over others, manage battery usage, and control special app access permissions. The speaker advises on how to investigate apps with dubious permissions, such as all file access and Wi-Fi control, and how to use the phone's settings to disable unnecessary permissions. The paragraph also touches on the importance of monitoring data usage to detect potential spyware activity.

10:05

📍 Protecting Your Location and Detecting Trackers

This paragraph emphasizes the importance of safeguarding your location data from unauthorized access. It provides instructions on how to review app location permissions and manage location services. The speaker also introduces a method to detect nearby trackers, such as AirTags, by using a specific app from the Google Play Store. The paragraph concludes with a call to action for viewers to remain vigilant about their privacy and to check for hidden cameras and other surveillance devices.

Mindmap

Keywords

💡Spy tracking app

A spy tracking app refers to software designed to monitor and log the activities on a phone without the user's knowledge or consent. In the context of the video, such an app can capture messages, pictures, track the phone's location in real time, and remain hidden unless specifically looked for. These capabilities are highlighted as a significant invasion of privacy, emphasizing the ease with which such software can be installed on someone's device, often in as little as 15 seconds.

💡Play Protect

Play Protect is a security feature by Google that scans apps for malicious activity to prevent harmful apps from being installed on a device. The video discusses the necessity for a spyware installer to disable Play Protect to install a tracking app, positioning it as a critical defense mechanism against such invasive software. It is enabled by default, and its status serves as an indicator of potential tampering if found disabled.

💡Install unknown apps

This setting allows the installation of apps from sources other than the official app store. The video describes how spyware might require enabling this option to allow the installation of unverified, potentially malicious software. Monitoring which apps have permission to install unknown apps is recommended as a security measure to prevent unauthorized spyware installation.

💡App security

App security encompasses measures and settings on a device that ensure only legitimate and safe apps are installed and operational. The video mentions checking 'App Security' to verify that 'Play Protect' is enabled, illustrating a method to safeguard against spyware. Users are advised to regularly inspect app origins and permissions as part of maintaining app security.

💡Special access

Special access refers to permissions that allow apps to use specific features or data on a phone that are not available to most apps. The video points out the importance of scrutinizing apps with special access permissions, like 'all file access' or 'usage access,' as spyware often requires such permissions to monitor the device's activity extensively. Managing these permissions is crucial for preventing unauthorized data access.

💡Battery usage

Battery usage is a critical indicator of potentially malicious app behavior, as highlighted in the video. Spyware apps are battery-intensive due to their continuous data transmission and location tracking. Reviewing which apps consume significant battery power can reveal unauthorized or hidden spyware activity on the device.

💡Data usage

Monitoring data usage is essential for identifying apps that transmit large amounts of data, possibly indicating spyware activity. The video emphasizes comparing data usage over time to spot unusual increases, which can signal the presence of spyware sending information to a remote server. Regularly checking data usage helps in detecting and mitigating unauthorized data transmission.

💡Location services

Location services allow apps to access a device's GPS to provide services based on the user's geographical location. The video cautions users to review which apps have permission to use location services, especially those allowed to access the location at all times, as this can be exploited by spyware to track the user's movements.

💡Tracker detect

Tracker detect is an application mentioned in the video that helps identify the presence of unwanted tracking devices, such as Apple's AirTags, nearby. This is particularly useful for Android users to safeguard against being unknowingly tracked, illustrating an additional security measure outside of direct smartphone spyware.

💡Premium SMS

Premium SMS refers to text messages that incur additional charges beyond standard messaging fees. The video highlights how some spyware apps can send premium SMS messages from the victim's phone, resulting in unauthorized charges. Monitoring and managing SMS permissions is advised to prevent financial exploitation through premium SMS scams.

Highlights

Installing a spy tracking app on a phone takes only 15 seconds, allowing access to every message, picture, and real-time location.

The software remains invisible unless one knows where to look, making it a significant invasion of privacy.

Web history, keystrokes, passwords, and messages are all accessible to the person who installed the spyware.

Physical access to the device is required to install tracking software, often obtained through deception or when the owner is unaware.

Disabling Google's Play Protect is a red flag, as it prevents the installation of malicious apps.

Checking the settings for the installation of unknown apps is crucial to prevent spyware.

Legitimate apps can be verified by checking where they were installed from, such as the Google Play Store.

Spyware apps often request permission to display over other apps, which is a suspicious sign.

Battery usage can indicate the presence of spyware, as they are known to be battery-intensive.

Special app access permissions should be reviewed to ensure no unauthorized file or data access.

Unusual app permissions, like Wi-Fi control for non-essential apps, can be a sign of spyware.

Checking for apps that turn the screen on without user intent can reveal hidden spyware.

Data usage can be monitored to detect any unusual increase that might indicate spyware activity.

Location services should be reviewed to ensure no unauthorized apps have access to your GPS data.

AirTags and similar devices can be used for tracking; Android users can download Tracker Detect to scan for nearby tags.

The video also addresses the issue of hidden cameras, providing a link to another video on how to find them.