Merdeka.com – News about the use of the popular Angry Birds game application as a means of spying by the National Security Agency ( NSA ) and the Government Communications Headquarters ( GCHQ ) is enough to make people gasp .
In the information explained that by using these games , then both the national bodies of the two countries that can harvest personal data of mobile device users .
But how do the two national bodies that do it ?
Quoted from the Telegraph ( 28 / 01 ) , in explanation of Edward Snowden , all the people who use mobile devices as a means for self publication on social networks can easily be stolen data.
Conjunction with the Angry Birds game is because the game is becoming popular and fame is very high in many countries in recent years .
As with any process inside a smartphone , every person who plays the game Angry Birds ( which is connected to the Internet ) will indirectly connected to the central server .
In the connection process , there is a special technique used by the NSA and GCHQ to ‘ intercept ‘ the data was on the way before getting to the central server .
Thomas Labarthe , Managing Director for Europe at mobile security firm Lookout , explains that most applications do not use encryption when transmitting information or just encrypt specific details such as a financial transaction .
Another reason might be the smartphone application ‘ leaky ‘ than any other platform is due to mobile device users are not too concerned with the security of their gadgets .
” When the user installs the application they will usually be presented with a warning message . Unfortunately , most people do not read the warning and immediately use the application , ” said Michael Darlington , Technical Director of the Global Cloud Security Company Trend Micro .
Adrian Culley , technical consultant at Damballa , a former member of the unity of the Computer Crime Unit at Scotland Yard , said that once an application has been granted access to personal information , users have little or even not be able to have the right to control over their information .
It is therefore the responsibility of the application developer is expected to protect the privacy of their customers by increasing the level of encryption used and devise a better way to make users know what information is accessible to an application and be able to know where the information will go away .
” Very simply , to protect your privacy , when an application requests access to personal information , it is wise to reject it . Advisable not to install the application in any way if it does not know the track record of the manufacturer, ” said Culley .