The Hotspot Phone For Enhanced Security
Above all, don’t use your phone beyond what you would use your land line for, texting is a problem it has been exploited before.
Your phone should become a brick that gives you hotspot, voice and voice mail. your phone operating system will keep it updated and somewhat secure.
If your phone provider installs helpful applications to pay the bills, that is dangerous, and should be disabled, use their website instead.
The app stores are a powerful attack vector, and AI enabled troublemakers will be sneaking in hidden code all the time.
You must avoid the app store on your now doorstop brick phone, that you never really use, beyond enabling disabling the theater and voice.
Here, we make use of the hotspot, you can have a web browsing handset, that is most likely to get hacked, you will have your apps and social on here.
You have to carefully consider what you use and install, and expect to get hacked here.
Think of this hotspot handset as your throw away phone, if you can.
Converting your precious main phone into a hotspot brick, is not just inconvenienced, it is also a not guaranteed to keep you safe.
You could be made to execute code, by simply receiving a text message.
So not using your phone the best you can is the safest idea, no personal information, no apps, means nothing to hack.
And then having that second handset, connected via hotspot, just to use the web for necessary things will keep you somewhat safe.
And one wonderful feature here, since you barely use your second handset, is the ability to reset it.
All you have to do to get back on the internet, is enter your main phone hotspot information.
For billing and payments, use a laptop, don’t browse the internet on it, just use it for billing and private information.
Not perfect, but you have no choice, and when those websites are made to server malicious code.
They will be helping you deal with the attack, providing you with tips and lists of steps and such.
The scenario here is your gas company sending you a PDF bill, that has been infected with a zero click exploit.
Corporations are as vulnerable as you ActiveMQ a nice network component, has been found to house a 13 year old bug, so no one is safe.
Limit personal information exposure, by limiting the use of internet.
Don’t use websites, that force you to log in, and there will be nothing to steal or infect.
The second handset, and a laptop is a shoddy fix, but the entire model of apps and hoping to secure them is bonkers.
The older your phone/laptop, the higher the probability of getting hacked, too.
Let us now do a quick recap, Artificial Intelligence will be used to easily hack you.
But if you limit the use of your phones, there will be nothing there to hack.
And if you get your secondary hotspot-handset hacked, you can just reset it.
The older your phone the more vulnerable it becomes, and the more apps the higher the chance you are already hacked.
Use a cheap laptop for paying bills, don’t browse the internet on it, and don’t even trust the good guys, they see you as a product.
Don’t rely on location information, a local phone number or familiar service provider IP is not what you think
Delete your online presence, hit the gym, but don’t install their app.
In closing, I wanted to mention that if you are a privacy conscious individual, use AI to add household members to your network.
You will have to ask AI to create the needed software for you, and you will be able to regain your privacy in getting lost in the noise.
If you are a programmer, don’t use 3rd party modules, let AI create them for you and review its own security measures.
Spread your activity across multiple computers, and backup and airgap whatever you want to keep secure.
Getting attacked with AI is not like being infected with a virus, it is like being actively outsmarted by a team of PhD hackers.
The big companies are the most vulnerable, because they are the most visible, the big attack may just come from service providers like electricity or internet.
And if you are worried that the internet gets boring this way, just ask your local AI to generate one for you live
With exciting news and blogs for a change, tell it to re-interpret personalities or job titles into interesting things.
You haven’t lived until your AI re-interpreted all your political news feeds, as clever antics of the lizard people.
And reversed moon adventures, as visitations from aliens.
Cheer up, you have been alerted of security issues, before the worst of it hits.
Perhaps this will awaken the network security professional in you, and you will discover a new career path where you try to outsmart the smartest thinking machines.