Hi, do you see the title of this unit? Yes. I can know everything you do with your mobile phone. If you think about the device, the mobile phone, it has a lot of capabilities connected and information location, maps using the GPS. You can take photos. You can record video and audio you can do a lot of things with the mobile phone you too, if you see this in the context in the global context of the information era you can take this device as a element to a spy and to get information about people even if the people is not aware of the many ways of retrieving this information and using applications and spywares and this kind of thing. So, let's see several examples that we can develop in detail, okay. If you see many times you just doesn't understand how the application works. Okay, for example, the typical fitness application that are recording when you are running or you take wonders or you are just making some exercise. They are retrieving information about you and your location and they are uploading this information to services on the internet to cloud services, in this specific case in this example if you see this is the map from the BBC. This is the map of a secret army base that were exposed to Internet because of the soldiers were using an application for fitness. And whenever they were running the map was uploaded to this service and other people could check about this. So they exposed a very secret base, a very military base, a very secret military base to Internet on using the information related to the application. So in this case, the application is doing things you are not aware of, it is doing nasty things recording the audio through the microphone of your mobile phone. Whenever you go to a bar to watch a football match with your colleagues taking a beer and these kind of things. What is the main concern here? The application it is not exposing or giving information a specific information about this behavior. It is recording without your consent. Okay, even in the EULA, end user agreement, they are giving some reference about that. They are recording audio to do whatever things they do. Okay. What are they doing with the recordings taken from your mobile phone whenever you are in a bar and the bar is not paying for the rights for the match. I mean, for example, you have the right to see the match in your TV at home but not to show to an audience in a location. That is in public location. Okay. So this is our main problem with the LaLiga because without the user knowing about they were recording everything related to the football match detecting fraudsters that were not paying for the match rights in this moment. Okay, and an application that is a legit application doing something that is not very ethical at the end. Okay, and the next one if you see here you have a spyware in your mobile phone. Why is happening and how they are spyware appear in your mobile phone? For example in the Chinese border? This is recent news. They are putting spyware in the tourists' mobile phones to control them, to watch them, to record them. So they can take care of the location, the communications, the ambient microphone so they can use it as an espionage device watching or hearing everything in an area okay, and they can take the messages or even put fake calls and send fake messages. So seen in the mobile device take on mind this is not only in China in the United States border. They can retrieve your mobile phone or your computer because this is a federal requirement by the law. Okay, so be careful because many times if your mobile phone is out of your sight, maybe someone can install or deploy an spyware there. Okay. So think about it. There are many ways your mobile phone can expose confidential information because you don't understand how the application worked because the application is doing things that are not very clear or even they are not documented. They are doing these things in subdued in the underground. Okay, and the third thing the third last thing sorry is because someone installed on a spyware in your device, okay. >> And now we're going to give you some advices to avoid a deep surveillance through your mobile phone. Okay, first of all, install apps for verified sources don't install wherever packet to find on Internet. For example, just look for the original sources and try to install the app from there. Okay. Second one install apps according to your needs. Do you really think that you need a flashlight app? For example, if you install a flashlight app, the people that is developing that app needs to earn money. So, how can they earn money think about that? Okay, but anyway in case you need to install the flashlight app, for example, you have to be very careful with the permission that the app is requesting you when you are installing. Okay, so maybe it's okay. I'm going to install a flashlight app, but maybe the flashlight app doesn't need for example museum for writing files in your file system okay. The third advice is never leave your smartphone unattended, if you leave your smartphone unattended someone can take the smart phone and install spyware. If someone installing spyware you have a big problem because you can the one that installed the spyware can control almost all your life can make calls in your name, can listen all the environment with your mobile phone. So please never leave your mobile phone unattended. And would you leave your mobile phone unattended try to protect the mobile phone with lock screens? For example that we will see in other videos. Okay, and finally, of course, you have to leave your mobile to other person like for example in a border in a country. You have to learn how to check what apps you have installed in your system. So you need to learn a little about how to check how many apps I have in the smartphone. And after that after I leave my mobile phone. I get it back. I have to check again the application. I have installed on my smartphone and with all these advices you can minimize their possibility to be expired. By this kind of software see you next unit.