How is the app helpful for users?
With the help of the app, millions of fake or stolen devices have been blocked. Users can instantly check the validity of their phone and the security of their SIM connection.
What will be the impact on privacy?
The app cannot be completely removed and accesses device identifiers, SIM information and telecom data. Therefore, people fear that this may increase the possibility of fear of government surveillance and data collection.
What are users’ concerns?
People are expressing concern on social media that users should have control over the apps installed on their devices. Challenges like data retention, misuse and weak monitoring systems also remain.
After all these answers, let us understand how an app is able to track the phone’s activity?
Whenever you install something on your phone, you must have noticed that it asks for many types of permissions. It is worth thinking that there is a small app sitting in your phone. You are making a call, using WhatsApp, taking a photo or just locking the screen at night, and that app is silently watching everything.
How? After all, what are the tricks by which an app can capture your every activity?
The phone is not an ordinary thing. This is the CCTV camera of your pocket. The only difference is that the camera is not installed outside, but inside, and if an app takes a little wrong permission, enters into the system a little, or starts running silently in the background, then it can read the entire story, not just half of your life.
Permission is a way
So as mentioned earlier, this is a game of giving permissions to the app. Asks when downloading the app. ‘Access location?’, ‘Access contact?’, ‘Access photo-video?’ Many people press ‘Allow’ because it is in a hurry. But this is a goldmine for small ‘Allow’ apps.
Got the location? So he will know when you go to office, when you return, where you were at night. You must have noticed that sometimes he also starts telling the traffic of the route where you go every day.
Got contacts? So he will get the list of all your friends and relatives.
Got camera/mic? So if the app wants, it can even listen to the sound of you turning on the screen.
Second is Background Activity
Now coming to the second game, that is background activity. Many apps keep running even without opening. The screen may be off, you may be sleeping, but the app continues to do its work.
Every movement on the network, movement of your phone, which app you open when. All this keeps getting recorded in the background log, and the surprising thing is that most people do not even notice that an app is continuously consuming the internet or sucking the battery.
The third one is Trackers
Another big way is trackers. There are small codes already hidden inside many apps, whose real work is to control your browsing, your touch-patterns, your purchases, how long you stay on which screen. Understand all this. These trackers come from your phone and reach companies that earn money by selling data. And then suddenly you get the question ‘Do you want this product?’ The ad starts appearing.
The last and dangerous one is Network Monitoring
After this comes Network Monitoring. If an app has taken the permission of the network and is able to access the device info, then it can see which Wi-Fi your phone uses, at what time you keep mobile data on, which websites open, which app uses the internet.
All this means tracking. Your digital habits become known, and the most dangerous foundation is system level access. This is the level where if an app reaches, it can become a ‘guide’ to all the activities of your phone. Who called, how long did the conversation last, which app ran for how long, when did the phone lock-unlock, who changes the screen brightness, everything.
This is where the fear of surveillance begins, because such access is usually only available to system apps. If any other app acquires it, then it becomes the owner of your phone.
The real fear increases when an app does not even give you the option to delete or close it. Meaning it will always be inside the phone, and whether you like it or not, it will keep running. In such a situation, whether it is a government, a company or a developer, trust becomes difficult.
So how can an app keep an eye on your every activity? Answer permissions, trackers, background activity, network access, system control. The more of these five an app gets, the more your life opens up to it.





























