Interesting to hear such things discussed at that level. Turning it off is suggested to get rid of compromised background processes that might be spying on users. Obviously, this only help against malware that isn’t permanently installed on a phone.
vegivamp ( @vegivamp@feddit.nl ) English51•2 years agoAs if any spyware worth it’s salt didn’t install itself as service with an innocuous name. Something like “Facebook” or “TikTok”.
Artanis ( @Artanis@feddit.it ) English12•2 years agoundefined> Something like “Facebook” or “TikTok”.
I wouldn’t call those innocuous at all, lol.
Hyacin ( @Hyacin@lemmy.ca ) English10•2 years agoI have both of those spywares installed!!
That was my initial reaction too, but I believe there is also a good amount of attacks that use 0-day exploits and might not have an angle for permanence yet.
distractedcactus ( @distractedcactus@beehaw.org ) English29•2 years agoThis is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.
Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.
cark ( @cark@beehaw.org ) English11•2 years agoThat is not true. Many attacks (e.g. the recently revealed Operation Triangulation) do not have persistence.
aranym ( @aranym@lemmy.name ) English5•2 years agoYup, a lot of very sophisticated mobile malware does not have persistence. His advice holds up.
abhibeckert ( @abhibeckert@beehaw.org ) English5•2 years agoyou’re better off destroying it and buying a new one
Um, what? Spending a thousand bucks on a new phone, which they will probably infect almost immediately, is poor advice.
If I was in that situation the first thing I’d do is disconnect it from the internet. The next thing I’d do is lock everything down so the attacker can’t use the phone to do any harm (reset passwords, etc, and don’t log into those accounts from your phone).
Atemu ( @Atemu@lemmy.ml ) English13•2 years agoSomething this might accidentally do is apply an update which would indeed be a boon to security.
SattaRIP ( @SattaRIP@kbin.social ) 11•2 years agoBut without my phone how will I know when 5 minutes have passed?
/s nothacking ( @nothacking@discuss.tchncs.de ) English11•2 years agoFun fact, the pegasus spyware, yes the NSO group one, will be removed by this. This is to avoid leaving evidence of an infection on the phone. (the phone can be reinfected in seconds of course)
Kasion ( @Kasion@lemmy.mackners.com ) English10•2 years agoWell I guess mobile phone marketing can use this an reason for poor battery life. It’s now a security feature to force users to reboot every 12 hours.
Pigeon ( @Lowbird@beehaw.org ) English3•2 years agoDoes setting your phone to limit background processes to 4 (vs the standard limit) in developer settings potentially have a similar effect? If it periodically kills the nefarious process so it can run something else as you usd your phone?