Manipulating a finger on the smartphone screen can also reveal the user's personal information
It may sound unbelievable, but researchers have recently announced the fact that how to swipe, pinch and touch the fingers on the phone screen can be used to track and steal user information.
Last week, scientists from CSIRO Data61 (Australia) presented at the Barcelona Security Enhancement Seminar about their new finding, that " gestures on the touch screen are full of information." Information that identifies and tracks users ".
Specifically, the research team conducted a test to collect touch data and swipe the screen from the user's finger through an application on Android. The results showed that the collected data can reveal 77.3% of user information, only finger swipe to the left can reveal up to 68.6% of the information. Even if researchers combine all touch, swipe, keystrokes and data samples, they can get up to 98.5% of user information.
This shows that "touch manipulation data" can be used to track users not only on smartphones but also on other smart devices, it can even be distinguished and monitored. Many users when they access the same device.
The researchers also issued a warning, security settings are not enough to protect users from this touch-based tracking.
See more:
- Unexpectedly detected, the smartphone is not secretly "eavesdropping" but "peeking" the user screen
- 72% of Vietnamese population use smartphones but 50% of them only listen to texting calls
- How to detect and remove eavesdropping software on smartphones
You should read it
- Do VPN providers keep track of your browsing data?
- 6 secret links of Google are used to track and collect user information
- Basic guide to touchpad gestures on Windows 11
- How to track the amount of data used on Android
- 7 Android gestures you may not know yet
- The way Facebook collects user information even without an account
- Xiaomi has been accused of monitoring users' browsing habits and data collection
- What data has been collected from major technology companies from users?
May be interested
- Broken smartphone screen, if you do not want to spend money, you can refer to these cool 'fix' waysplease admire the broken screen after being decorated to help the smartphone look more cool by users all over the world.
- How to choose random fingers on the game Gotchagotcha is a random finger-picking game by having many people click on the gaming screen.
- Trick to protect personal information on Google+this article would like to share with you tips to actively control the content of information you share when using google+. almost all user actions such as sharing photos, maps, even comments on youtube are transferred to google+ that sometimes users can't control.
- Google holds 10 times the amount of data that Facebook has on youthe number and type of data contained in the file shows that in addition to tracking the activities of google users, they also track the location of users standing and traveling in real life through their smartphone or tablet.
- Don't accidentally reveal your identity in screenshots and videos!whether it's streaming, screen sharing, or just posting screenshots, it's easy to share information you don't want to share.
- How to remove personal information from a Word documentmicrosoft word stores additional information such as name, file history, comments, and even where the document is saved. to ensure that personal information in word documents is not exposed, follow the instructions below.
- Clear all information on the Internet: Just go to a websitesince the internet has grown, many services have blossomed with different features to support users. however, along with that, each person's personal information becomes more and more on the internet, and is likely to be exposed if users themselves loopholes or security service providers are not good.
- Never reveal these 9 personal information during a job interviewfinancial information, relationships, political and legal perspectives .... are the top topics in the interview.
- Is personal information on the Internet still protected?let's take a look at the major threats to personal information on social networks as well as in the advertising content on the internet.
- Viruses appear to trick users into faxing personal datahackers have added the ability to deceive users with an email asking to fax personal information data to fake security investigators.