The Naked Scientists
  • Login
  • Register
  • Podcasts
      • The Naked Scientists
      • eLife
      • Naked Genetics
      • Naked Astronomy
      • In short
      • Naked Neuroscience
      • Ask! The Naked Scientists
      • Question of the Week
      • Archive
      • Video
      • SUBSCRIBE to our Podcasts
  • Articles
      • Science News
      • Features
      • Interviews
      • Answers to Science Questions
  • Get Naked
      • Donate
      • Do an Experiment
      • Science Forum
      • Ask a Question
  • About
      • Meet the team
      • Our Sponsors
      • Site Map
      • Contact us

User menu

  • Login
  • Register
  • Home
  • Help
  • Search
  • Tags
  • Recent Topics
  • Login
  • Register
  1. Naked Science Forum
  2. Non Life Sciences
  3. Geek Speak
  4. How could a WhatsApp hack compromise other apps on a phone as well?
« previous next »
  • Print
Pages: [1]   Go Down

How could a WhatsApp hack compromise other apps on a phone as well?

  • 1 Replies
  • 4179 Views
  • 9 Tags

0 Members and 1 Guest are viewing this topic.

Offline nudephil (OP)

  • Global Moderator
  • Sr. Member
  • ********
  • 261
  • Activity:
    0%
  • Thanked: 5 times
  • Naked Scientists Producer
How could a WhatsApp hack compromise other apps on a phone as well?
« on: 16/07/2020 16:38:11 »
Gabriel asks:

I read somewhere that Jeff Bezos lost $20 billion approx (through divorce) because he added the Saudi prince on his WhatsApp. The story goes says he received a link from the prince on WhatsApp, which subsequently led to his phone being hacked, and the news of his affairs made public. What kind of access and info they could have? Aren't the apps for messages and for pictures distinct? Why should hackers be able to see virtually all info?

Any thoughts?
Logged
 



Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11035
  • Activity:
    9%
  • Thanked: 1486 times
Re: How could a WhatsApp hack compromise other apps on a phone as well?
« Reply #1 on: 17/07/2020 12:46:48 »
Quote from: OP
What kind of access and info they could (hackers) have?
In the early days of computing, any program that began executing could access any piece of information in any part of memory.
- Of course, in those days, computers weren't connected to the internet,
- so it was hard to get a rogue program into the computer
- and it was hard for a rogue program to send any information very far

Computers these days are much more secure - they have facilities like "virtual memory", so that a program (today's "app") can't see the data of any other program. Any attempt to access data outside its own space causes the program to be shut down.
- However, programs need to access various facilities of the smartphone, and phones provide interfaces to access these functions (like location, camera and microphone).
- I understand that Apple requires the user to give permission to access phone functions (and this basic level of security is checked before an app is allowed in the Apple App store).
- I understand that Android comes from a more "open source" philosophy, and it is easier for an app to access functions in the phone without the user knowing. There is also a lower bar for distributing Android apps - developers can distribute apps themselves.

In any case, hackers are continually trying new ways to gain access to the whole phone. In UNIX-based systems (including Apple and Android operating systems), the ultimate goal is to have your app recognized as "root", which has free access and control of everything on the phone.
- But even without seeing everything on the phone, hackers can still do a lot of damage...
- And since virtually all apps these days access the internet, it's easy to send anything you discover to anywhere in the world
- The other challenge for the hacker is to get someone to load the rogue program - it may be as simple as clicking on a whatsapp link from a Saudi Prince - or clicking on an email from a Nigerian prince.

See: https://en.wikipedia.org/wiki/Virtual_memory
Logged
 



  • Print
Pages: [1]   Go Up
« previous next »
Tags: whatsapp  / bezos  / jeff bezos  / saudi  / prince  / hack  / hackers  / phone  / apps 
 
There was an error while thanking
Thanking...
  • SMF 2.0.15 | SMF © 2017, Simple Machines
    Privacy Policy
    SMFAds for Free Forums
  • Naked Science Forum ©

Page created in 0.291 seconds with 28 queries.

  • Podcasts
  • Articles
  • Get Naked
  • About
  • Contact us
  • Advertise
  • Privacy Policy
  • Subscribe to newsletter
  • We love feedback

Follow us

cambridge_logo_footer.png

©The Naked Scientists® 2000–2017 | The Naked Scientists® and Naked Science® are registered trademarks created by Dr Chris Smith. Information presented on this website is the opinion of the individual contributors and does not reflect the general views of the administrators, editors, moderators, sponsors, Cambridge University or the public at large.