Why can a mobile phone be located even after it is turned off? How many secrets do you know about these mobile phones?

Why can a mobile phone be located even after it is turned off? How many secrets do you know about these mobile phones?

Checking on someone? Looking for someone due to a debt dispute? Or even mortgaging a vehicle, people usually use positioning methods to lock on to the target, and the most common method is mobile phone positioning. In order to avoid being maliciously tracked, what can we do?

First, let's understand what is the difference between locating a mobile phone when it is turned on and turned off?

When powered on, the phone will send two-way positioning information to surrounding base stations at a frequency of milliseconds. If criminals want to obtain the location of the phone, it will not be difficult.

When the phone is turned off, it will send a signal to the base station, telling it to turn off. Normally, if you call this phone, you will be prompted that the user you are calling is turned off. If the phone is physically damaged, you will be prompted that the user you are calling is out of service.

So, will it not be located after turning off the phone? The answer is no.

If you use an Apple phone, you may not know that the NSA can continue to track the target phone after it is turned off. This is because the NSA implants a special Trojan software into the target phone in advance to provide an interface for future positioning. This is really terrifying.

There is another situation, that is, if the SIM card is removed, the location cannot be tracked, right? Not at all. Even if the SIM card is gone, you can still find out where the phone has been turned on by investigating the phone ID associated with the number, thereby tracking the geographic location information.

So how can we avoid being located? There are two ways. The first, and the safest way, is to remove the battery or physically destroy it, but this is too costly for the phone, right? It is even more expensive for the wallet. The second way is to interfere with the signal, wrap it with several layers of tin foil, or put it in an iron box? Of course, you can also refer to Snowden's method and put the phone in the refrigerator, haha~


<<:  The Ministry of Industry and Information Technology responded to netizens: Caller ID fees will be gradually eliminated within 3-5 years

>>:  Tesla to develop an App store to compete with iOS and Android

Recommend

A Getting Started Guide to Web Components

[[383293]] Today's front-end development is b...

8 Tips for B2B Digital Marketing

In a recent white paper, Accenture released an in...

Marketing = communication. Whether you like it or not, this era has come.

Let us first consider two examples. The first exa...

Useful Information | How to plan a public account operation plan?

I'm currently working on an overall operation...

B station traffic acquisition methodology

Bilibili has always been a traffic pool that has ...

Should companies develop WeChat mini-programs?

Should companies develop WeChat mini-programs? Do...

Why are 80% of operations destined to be just miscellaneous tasks?

If a person wants to operate well, I think he may...

4 classic routines for brand marketing in 2020

As the pages of the December calendar turn, it in...

Traffic 2.0 era: How do operators manage data traffic?

1. China Telecom’s “Flow Treasure” and China Unic...

It’s better not to eat this kind of melon!

Summer is the time when a lot of fruits are on th...