Attack Vectors of a Smart Phone

in hive-196037 •  3 years ago 


A quick overview of the various ways in which a phone could become compromised. Don't worry, your phone is probably safe, this is more of a thought experiment/infotainment. That said, it is always a possibility, and knowledge is power.

Hardware Wallet:

PC:

Credit to Admiral Bob for the background music “Isolation Swing”, Licensed Creative Commons Attribution.


▶️ DTube
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!