Named ways to determine the location of a smartphone with geolocation disabled

Named ways to determine the location of a smartphone with geolocation disabled

Expert Myasoedov: you can determine the location of a smartphone without GLONASS and GPS

Disabling geolocation on a smartphone will not help hide the location of its owner from everyone. Expert Pavel Myasoedov, in an interview with the Prime agency, named ways to determine exactly where the phone is.

“The probability of becoming a victim of a cybercriminal who has received data about your location is quite real,” he said.

According to Myasoedov, it is possible to determine the location of a cell phone smartphone without GLONASS and GPS modules.

“When sending messages in a messenger, posting photos on social networks, or simply opening a site in a browser, the gadget exchanges metadata with the server,” the specialist warned.

The expert also noted that the metadata carry information about the Internet provider. Thus, attackers can determine in which house a person lives.

Pavel Myasoedov explained that each device has its own unique network identifier. Every time the gadget connects to a public Wi-Fi network, the address becomes public.

It is also important to consider triangulation technology. The expert noted that the three nearest communication towers allow determining the location of a cell phone with an accuracy of up to 300 meters.

In addition, geotargeting with the help of malicious software can be attributed to tricks. Programs write sound, correlate it with data from instant messengers. Further, with the help of neural networks, the developers are given the probable locations of the victim.

In this case, the most effective way to protect will be the use of a push-button telephone and frequent changes in geographic locations. Myasoedov also advised not to use public Wi-Fi networks and turn on VPN whenever possible.

Earlier, expert Vahe Zakaryan named a method that allows you to recognize the surveillance of a smartphone owner. He explained that at the moment many programs have been developed that can transfer confidential information about a smartphone user to third parties. There are several ways to identify these applications. In particular, the smartphone began to overheat unexpectedly, the volume of Internet traffic consumed increased sharply, Zakarian noted.

Source: Lenta

You may also like

Immediate Access Pro