👋 Welcome to Digital Identity!
If you suspect a black hat hacker is monitoring all devices on your home Wi-Fi, immediately disconnect your devices from the network to stop further access. Reset your router to factory settings, change all Wi-Fi and admin passwords to strong, unique ones, and update the router’s firmware. Run antivirus scans on all devices, and only reconnect after securing your network with WPA2 or WPA3 encryption, disabling WPS and remote management, and enabling MAC address filtering. If sensitive information was compromised, consider contacting authorities.
Every cellular phone has a unique electronic ID, and is broadcasting it when not in airplane mode, or and powered on.
Any cellular tower within range receives these broadcasts so that your phone can be reached.
Local exchange carriers have switches that use a negotiation protocol to decide which tower near your phone would be used to connect to your phone.
Using the signals from nearby towers to triangulate your location, the location of your phone can be determined within a few meters.
The logs of this switch data are kept for a long time.
Comments
Post a Comment