In the era of the Internet of Everything, we need to be alert to the "burying mines" of mobile phones

  Dong Xue

  "Professional tools, all brands of mobile phones can be unlocked in seconds", "screen locks and account locks cannot be unlocked and full refunds"... As mobile phones play an increasingly important role in work and life, various flash unlocking tools for cracking mobile phone systems appear quietly , which can be easily obtained through e-commerce platforms, online forums, street repair shops, etc.

These tools are sometimes used by cellphone theft gangs to sell stolen goods, and some users' cellphone security has been buried.

  Under what circumstances do you need to forcibly unlock the phone, rather than through a passcode or official after-sales service?

Except for a few electronic enthusiasts to use flash to expand the function, most of the time the answer is: the source of the mobile phone is unknown.

The public security organs have dealt with many similar cases in recent years: thieves have used flash unlocking tools to crack a large number of stolen mobile phones and sold them as second-hand phones or fake new phones for huge profits.

What's more, after unlocking, obtain user information, and further commit illegal and criminal acts such as theft of funds and fake loans.

  After some mobile phones were cracked, the "back door" opened wide and entered the market again, bringing risks to new users.

Many brands of mobile phones have strengthened security protection, and security risk warnings will pop up after the system is cracked.

However, there are also some mobile phones that cannot detect the risks, and some flashing and unlocking tools themselves have "bad thoughts", so users have been stolen privacy, stolen funds, pre-installed junk applications, secretly sucked traffic, maliciously inserted advertisements, etc.

Such tools must be cleaned, minesweeper for cell phone security.

  High-risk vulnerabilities that can be exploited are called "cyber munitions", and finding and attacking "cyber munitions" requires strong technical capabilities and R&D investment.

Most of the teams behind such tools on the market do not have such capabilities.

Based on this, mobile phone manufacturers should vigorously strengthen security management.

  It should also be noted that different mobile phone manufacturers place great emphasis on security management.

In order to facilitate maintenance and save costs, some mobile phone manufacturers will set the "engineering mode" on the system and authorize the use of relevant "privileged tools" to the official maintenance point. Flashing and unlocking uses this mode and related tools.

Mobile phone manufacturers that pay more attention to safety management require system flashing-related maintenance to be returned to the factory, and each flashing is controlled by the manufacturer, and instructions need to be sent to the official server.

  In the era of the Internet of Everything, although security management does not directly create profits, it is the lifeblood of the long-term development of mobile phone manufacturers.

Only by improving its own safety management system and increasing investment in related software and hardware research and development can it win long-term market recognition.