How to detect whether my phone is monitored?

Carrier-class monitoring individuals can not find that it is a mobile communication system has a function.

On any normal mobile communication system, there are legitimate monitoring function, which is written in the agreement, each of the mobile communication system in the design will have a dedicated monitoring interface, this is not a personal aversion.

Such as LTE systems, PGW is monitored interfaces.

But this point can be assured that this monitor is a very high carrier-grade, but there are very few operators themselves of this privilege. In addition, such monitoring can check a matter of record, and the right to delete records of such monitoring is in the hands of the other part, played the role of mutual supervision.

In general, this monitor only when it comes to crimes, the relevant agencies in pairs, holding a letter of introduction, the only operator with monitoring. The internal operators, they are afraid to do, our entry, when there are relevant training, this stuff is written criminal law, so this is a red line, this operator's internal management is very strict, and no one dared touch the red line.

Some illegal APP class, even if you are caught, the individual is difficult to find, and even that you simply can not find.

Some media say from what voice changes, what changes can flow out of the phone to be monitored to determine, in fact, these are not fly.

Now the voice is voice over IP, and you call will not be monitored and any changes, if your U disk data by others Copy and then back into a place, you can not find the U disk Like any data has changed.

Now mobile phones regardless of Ye Hao voice, Internet and the like record or, all of the data, the amount of data and voice here is actually very small, even with the upload flow, but also not get much traffic. Packages are now common to G calculated today, the individual is unable to discover what this abnormal flow through.

Personal privacy as much as possible to avoid the leak, is the most reasonable approach.

We have to do is pay attention to apply for permission to install the APP, a regular download software, do not download software from unknown sources, this is what we can do.

Some unknown link, or it may hidden Trojan virus, do not click, a lot of unsafe websites may also bring some risks, security software on the phone is to be installed.

There is also plenty of free WIFI, in fact not safe, so to avoid disclosure of personal privacy, do not connect from unknown sources WIFI in public places, so as to relatively safe.

There is also, the family of WIFI password is also not free to tell other people, this may lead to the family of WIFI has become unsafe.

现在手机端的WIFI万能钥匙,会上传自己的WIFI密码,这里可能也会导致WIFI的密码泄露,使得网络变得不那么安全了,这种APP也尽量不要在手机中安装。

总而言之,现在不管从哪个方面看来,手机被监控个人都是无法发现的,我们要做到的就是尽量规避风险,安全从我做起,这样才更靠谱一些。

来源:http://www.1994july.club/seojishu/?cat=8

Guess you like

Origin www.cnblogs.com/a5651651616/p/12215616.html