Attack Vectors of a Smart Phone

8

  • 36
  • 0
  • 0.184
  • Reply

  • Open in the desktop app ADD TO PLAYLIST

    natebowie

    Published on Jun 26, 2021
    About :

    My first video on 3Speak.

    A quick overview of the various ways in which a phone could become compromised. Don't worry, your phone is probably safe, this is more of a thought experiment/infotainment. That said, it is always a possibility, and knowledge is power.

    Hardware Wallet:


    PC:

    Credit to Admiral Bob for the background music “Isolation Swing”, Licensed Creative Commons Attribution.

    Tags :

    tech technology security android apple

    Woo! This creator can upvote comments using 3speak's stake today because they are a top performing creator! Leave a quality comment relating to their content and you could receive an upvote worth at least a dollar.

    Their limit for today is $0!
    Comments:
    Time until natebowie can give away $0 to their commenters.
    0 Days 0 Hours 0 Minutes 0 Seconds
    Reply:

    To comment on this video please connect a HIVE account to your profile: Connect HIVE Account

    natebowie has no more videos yet.

    More Videos

    00:41
    4 views 2 years ago $
    00:38
    0 views 3 years ago $
    10:00
    1 views 8 months ago $
    15:33
    4 views 4 years ago $