A look into the rise of private decentralised, blockchain-based cellular networks

cryptocurrencies_mtytzpr.jpg


The price of freedom in 21st Century communications is steadily rising. As technology becomes more intuitive, so too does the tools at the disposal of both hackers and prying eyes dead set on attaining your personal data. As years go, we tend to keep more and more personal information on out phones, including personal finances, IDs, addresses and passwords. Although we are led to believe that smartphone companies are upgrading their security features, the increased volume of personal information stored on out personal devices provides hackers with more motivation to invade our personal data. Smartphones are now accepted by hackers as more valuable than both PCs and laptops as a means for accessing confidential information, and the number of breaches that are being experienced are expanding at a rapid rate. Sadly, in this day and age, there are plenty of potential vulnerabilities behind modern smartphones. From out-of-date software, to trojan apps, to phishing emails, to brute force attacks – we’ve become so accustomed to saving our personal information on the pages of our trusty sidekicks that any prospective breach could be disastrous. Here’s a distribution of new mobile malware by type.

Read More on Datafloq
Credit: Source link