Will power bank “leak secrets”? You can do it!

Since the user can’t see the structure under the shell of the power bank, it looks like a power bank on the surface. In fact, the internal structure may have been changed into a device with Trojan horse device by illegal elements. Once the power bank is plugged in, the information of the mobile phone will be directly “read” by the external device, and in serious cases, the account password on the mobile phone will be stolen directly; the second is that the data will be stolen Synchronization is just like a power bank with a built-in hard disk. When such a power bank is connected to your mobile phone, it is very likely to synchronize the data of the mobile phone to the internal hard disk without your knowledge. The third way is through wireless transmission. Some chargers are equipped with wireless settings. Once connected to the mobile phone, you don’t need the built-in hard disk, so you can transfer your data through wireless network It was transmitted to the lawless. < / P > < p > there have been news reports such as power bank eavesdropping and power bank positioning before Trojan horse implantation often has nothing to do with businesses. For example, the biggest feature of shared power bank is “sharing”. No one knows how many “hackers” have ever got it in their hands before using it. The power bank can be lent to you, or it may be lent to cheaters and hackers. At this time, cheaters and hackers are likely to “exploit the loopholes” and manipulate the power bank. < / P > < p > key tips: do not collect and purchase mobile power supply of unknown origin at will. When connecting the mobile power supply, if the prompt of “trust” pops up, please keep alert. < / P > < p > with regard to the security protection of mobile phones, we must be cautious, because mobile phones have become a mobile terminal integrating social networking, Internet access, payment and other functions. In the face of endless new criminal techniques, in the context of personal information is vulnerable to infringement, how to protect their mobile phone security? < / P > < p > 2. Install software with less “permission”: when installing app, do not easily agree to obtain personal information permission. You should also frequently open the mobile phone permission management, check the permission opening of mobile application, and close sensitive permissions such as call record, SMS, address book, etc. < p > < p > 3. Social circle of friends: all kinds of open circle of friends should have the right to view, and their personal status and photos are likely to be used by interested people. Those who need to be typed should be typed and uploaded as much as possible. Public WiFi: it is better not to use the public free network without password. It is easy to be hacked into and steal your phone number, home address, bank card number and other personal information. WiFi connection mode should also be set to manual. < p > < p > 5. Choose a secure download platform: now a variety of mobile phone apps emerge in an endless stream, many of which are installed into the mobile phone inadvertently. Some software carries viruses, which not only consumes traffic, but also maliciously deducts fees and steals users’ privacy. The best way to download mobile phone software is to choose a regular and safe download platform. Don’t click the link on the SMS or web page. Continue ReadingASMC, a lithography maker, was one of TSMC’s 14 top suppliers last year