• Re: Q: What threats do we really face when our phones are not fully pat

    From Carlos E.R.@3:633/10 to All on Sunday, April 19, 2026 22:31:54
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-19 18:59, Maria Sophia wrote:
    For an older Android phone, what "security" hazards do we REALLY face?

    In a recent thread, some of us were discussing our "security" situation.
    Newsgroups: comp.mobile.android
    Subject: Re: What is the history of Galaxy S-series & Pixel full support?
    Date: Sun, 19 Apr 2026 05:33:34 -0000 (UTC)
    Message-ID: <10s1pfd$3ot6t$1@dont-email.me>

    I'm not an expert in security threats, but in general, I'm not worried
    about them, but maybe I should be worried about them. Dunno. Do you?

    I assume many CVEs are specialized situations.
    I assume some (probably few though) are zero-click situations.

    I assume many use web links.
    I assume some use downloaded files (zero click or otherwise).

    But I've never really worried about it (although my phone is set up for privacy so it also probably as a bit of extra security by accident).

    What do others feel about not having fully patched phones?

    Q: What threats do we really face when our phones are not fully patched?
    A: ?


    Impossible to know unless you read all the CVEs. You can not assume they
    are irrelevant.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 07:06:44
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-21 23:06, Maria Sophia wrote:
    Carlos E.R. wrote:
    Q: What threats do we really face when our phones are not fully patched? >>> A: ?


    Impossible to know unless you read all the CVEs. You can not assume they
    are irrelevant.

    This is probably the most sensibly stated assessment of the threats we face when our phones aren't updated to the latest set of score 8 to 10 CVEs.

    What might be nice to keep track of are URLs of where we find CVE data.

    I don't know how to use this site, yet. Does anyone out there know?
    <https://www.cve.org>
    <https://nvd.nist.gov>

    I do know how to use the CISA CEV exploit data, but it's a small subset.
    <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>

    I don't yet know how best to use Android Security Bulletins though:
    <https://source.android.com/docs/security/bulletin>

    And those of us on Samsung can add their device-specific security bulletin:
    <https://security.samsungmobile.com/securityUpdate.smsb>

    Similarly, those of us on both platforms can use Apple's security bulletin:
    <https://support.apple.com/en-us/100100>

    There may be useful information in a vulnerability search page:
    <https://nvd.nist.gov/vuln/search#/nvd/home?resultType=records>

    What we need, I guess, is a "process" to make what Carlos suggested, something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.


    We'd check the CVE against how we use our own unpatched devices, I guess.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 11:45:31
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.


    No, I do not want a chauffeur. I simply want somebody that has the
    expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    I can not learn everything, I don't have that kind of time nor inclination.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Wednesday, April 22, 2026 15:55:44
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.


    No, I do not want a chauffeur. I simply want somebody that has the
    expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?) was
    already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-attack-3494479/>

    And that was just the first try. Bet there's lots more. So confirmation that
    my old phone's definately not good for sensitive stuff. Give it a try
    Frank...


    I can not learn everything, I don't have that kind of time nor inclination.




    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 19:17:05
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability- attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...

    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    But I don't know what the exact vulnerabilities and dangers are.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Jeff Layman@3:633/10 to All on Wednesday, April 22, 2026 18:32:23
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 22/04/2026 08:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.

    Well, I'm pleased I don't use my Xiaomi for anything requiring privacy
    or security.
    <https://app.opencve.io/cve/?vendor=mi&product=xiaomi>

    Rather a lot of critical vulnerabilities in the past couple of years,
    and a few other levels too. Not all for the same hardware, though. I
    didn't even know that Xiaomi did routers.

    --
    Jeff

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Wednesday, April 22, 2026 17:40:52
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/22/26 10:17 AM, Carlos E.R. wrote:
    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-
    attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...


    I know that there are flaws in Bluetooth that allow a passerby to get >entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.
    Gets worse with age...


    But I don't know what the exact vulnerabilities and dangers are.




    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 19:46:46
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 19:40, AJL wrote:
    On 4/22/26 10:17 AM, Carlos E.R. wrote:
    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-
    attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...


    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been
    off
    since the beginning but not for security but more likely because I just didn't use it. Also perhaps to save some battery? I just don't remember.
    Gets worse with age...

    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.



    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Wednesday, April 22, 2026 18:32:34
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    Carlos E.R. wrote:
    AJL wrote:


    I know that there are flaws in Bluetooth that allow a passerby to get entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been
    off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.


    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.

    Ah. I misunderstood. I thought you couldn't turn off Bluetooth not that you
    didn't want to. Well let's just hope your car doesn't leave unexpectedly or
    your watch makes you late... 8-O

    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...


    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 21:18:23
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 20:32, AJL wrote:
    Carlos E.R. wrote:
    AJL wrote:


    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's
    been off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.

    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.

    Ah. I misunderstood. I thought you couldn't turn off Bluetooth not that you didn't want to. Well let's just hope your car doesn't leave unexpectedly or your watch makes you late...ÿ 8-O

    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is guaranteed not to talk to bad guys...


    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.
    But that's impossible, many things require BT to be constantly on.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 21:41:24
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 21:33, Maria Sophia wrote:
    Carlos E.R. wrote:
    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...


    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.
    But that's impossible, many things require BT to be constantly on.

    Hi Carlos,

    We posted at the same time, where my hearing aids are bluetooth, and, of course, in a car, bluetooth is fantastic, but I turn off BT all the time.

    My point though, is that each of our susceptibility to CVE's is different.

    If there is a BT CVE, it won't affect me in the least, most likely.
    And yet, it may affect you a lot.

    What I'm bringing up that is on topic is that the threats are dependent
    on our phone, it's patch level, and more than anything, on what we do.

    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    I do it often. It is required to sign contracts, for example.

    ...


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, April 22, 2026 22:50:33
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-22 22:31, Maria Sophia wrote:
    Carlos E.R. wrote:
    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    I do it often. It is required to sign contracts, for example.

    I've had to sign paperwork with secure esign where I would never think of doing that on a phone, for a huge variety of reasons (not the least of
    which is how puny a phone is for reading fine print).

    I do that on the PC and even then, since my PC is hardened, it's a bitch.

    Often I am not given any option. It is phone, or phone. And I was at the physical shop, the last two contracts. Paper not accepted.


    But this fact that each of us is different underlays my rationale that a simple looooooooooooooong list of CVEs isn't all that useful for any of us.

    What we need is a list of CVEs that
    a. Affect only our devices
    b. And are based on actions that we do

    Of course, zero-click CVEs are the exception.

    I think it's possible, and, in fact, since I have solved some of the most difficult problems on earth when I was working in Silicon Valley, I could certainly solve it, but it's not something I will be spending energy on.

    Since I'm not likely going to invest energy solving it, I'm assuming
    someone else already did, but we have to find that particular site.

    Too-simply stated, it would, IMHO, ask for how we use the phone.
    And then it would show us the CVE's that are unpatched that affect us.

    Of course I can read the CVES, but it is a full time job.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Wednesday, April 22, 2026 22:01:35
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:


    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT needed.
    As always YMMV...





    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Thursday, April 23, 2026 13:14:36
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-23 00:01, AJL wrote:
    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:

    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that
    BT is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT
    needed.
    As always YMMV...

    There is also the smart watch. It needs BT.

    Yes, I also have a TomTom which is independent from my phone (actually,
    when I bought it, it needed my BT for internet, but I managed to change
    that). But basically all cars today come with a smart display that
    connect to smartphones, be them iphones or androids, with a cable or
    radio. And that display does way more than maps. Phone calls, messages,
    play podcasts, radio on internet, weather forecasts, etc.


    So, I should, in theory, make sure that my phone is security up to date.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, April 23, 2026 14:49:04
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    AJL <noemail@none.com> wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    [...]
    No, I do not want a chauffeur. I simply want somebody that has the >expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?) was
    already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-attack-3494479/>
    And that was just the first try. Bet there's lots more. So confirmation that
    my old phone's definately not good for sensitive stuff. Give it a try
    Frank...

    I did a similar search for our A51 phones (one still in use). The "AI Overview' lists 'Key Vulnerabilities and Patches' including the
    Exynos modem, but these were all patched in (dated) updates.

    The search did not specifically list any vulnerabilities which were
    *not* patched for this out-of-support device.

    So the kind of information Carlos is looking for, is not readily
    available, hence his wish.

    Anyway, as I (think I) mentioned before, that the *device*/*OS* has outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    That said, most 'banking' I do on my phone [1] is *reading* (past transactions, etc.), not performing transactions. Most, if not all, transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    [1] which still is in support

    [...]

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, April 23, 2026 15:08:26
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    AJL <noemail@none.com> wrote:
    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:

    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT needed.
    As always YMMV...

    I use Bluetooth for Android Auto in rental cars, much easier to use a navigation app which I know, than to try to figure out how the heck the built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on
    both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 16:28:18
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 2:37 AM, Andy Burns wrote:
    AJL wrote:

    My cars came with built in maps and direction capabilities. So no BT
    needed.
    As always YMMV...

    I find most built-in satnavs are poor compared to Waze/Google.

    I was just pointing out that the BT paranoid can live without it if wanted.
    I can use my phone's navigation (Google) in its holder since it has loud
    audio no BT to the car needed. But in some past trips and locally Google
    suggested poor routing IMO. These days I use the wife. She uses her iPhone
    and tells me where to go. It seem to do well and of course I'm used to her
    telling me where to go...



    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 17:30:09
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 4:14 AM, Carlos E.R. wrote:

    There is also the smart watch. It needs BT.

    Lots of toys need BT. Depends on personal wants and needs. My first watch in
    the 1940s and my current $6 Amazon watch do about the same thing: Tell
    time. I'm satisfied. YMMV...


    So, I should, in theory, make sure that my phone is security up to date.

    Me too. Wait, I can't... 8-O



    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 17:57:17
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    That said, most 'banking' I do on my phone [1] is *reading* (past >transactions, etc.), not performing transactions. Most, if not all, >transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of
    those apps on my security challenged phone, why take a chance...





    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 18:10:35
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 8:08 AM, Frank Slootweg wrote:

    I use Bluetooth for Android Auto in rental cars, much easier to use a >navigation app which I know, than to try to figure out how the heck the >built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on
    both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    I suspect that you and Carlos are like 99% of the population. An Apple Watch
    (gasp) even lives in my house. Dunno if it uses BT or not. Probably does.
    Heck when the wife has a problem with her iPad/iWatch she's on her own. I
    don't have a clue. Fortunately grandkids come in handy for fixing
    electronic toys like that...



    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Thursday, April 23, 2026 21:05:05
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-23 19:57, AJL wrote:
    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use
    many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    That said, most 'banking' I do on my phone [1] is *reading* (past
    transactions, etc.), not performing transactions. Most, if not all,
    transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past transactions. And once in they require nothing further for new transactions such as transferring out money to a perps account. Since I have no NEED of those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, April 23, 2026 19:54:41
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    AJL <noemail@none.com> wrote:
    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc. >are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    As (I think) I mentioned, I consider the banking app(s) safe if the
    bank(s) still support the 'old' Android version (in our case Android
    13). If they do and anything goes wrong which is not user-caused,
    they'll have a hard time not reimbursing the (financial) damages. While
    this is nost cast-in-stone in law, it is common practice in our country
    and probably is most of the EU/Europe.

    Another safety example: Our governmental/official-institutions ID
    system (DigiD [1]), still supports Android 13 (and possibly earlier).

    That said, most 'banking' I do on my phone [1] is *reading* (past >transactions, etc.), not performing transactions. Most, if not all, >transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of
    those apps on my security challenged phone, why take a chance...

    That is indeed not very secure. Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I
    don't consider that secure enough.

    [1] <https://en.wikipedia.org/wiki/DigiD>

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, April 23, 2026 19:54:41
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    AJL <noemail@none.com> wrote:
    On 4/23/26 8:08 AM, Frank Slootweg wrote:

    I use Bluetooth for Android Auto in rental cars, much easier to use a >navigation app which I know, than to try to figure out how the heck the >built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on >both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    I suspect that you and Carlos are like 99% of the population. An Apple Watch
    (gasp) even lives in my house. Dunno if it uses BT or not. Probably does.
    Heck when the wife has a problem with her iPad/iWatch she's on her own. I
    don't have a clue. Fortunately grandkids come in handy for fixing
    electronic toys like that...

    Look at these 'watches', like you look at our 'phones'. With our
    'phones', we do many, many things, but using them as a *phone* is only a
    small - if any - part of what we do with them. Same story with these
    'watches'.

    Phone, smartphone. Watch, smartwatch. You get the picture.

    BTW, my watch isn't a 'smartwatch' by the most common definitions.
    That's why I normally use the term 'activity-tracker', you know, for
    when I run the Boston marathon! :-)

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, April 23, 2026 20:00:03
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2026-04-23 19:57, AJL wrote:
    [...]
    My banking, investment, etc, apps all require a password to read past transactions. And once in they require nothing further for new transactions such as transferring out money to a perps account. Since I have no NEED of those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    For our banks we can still use a bank-supplied hardware device which
    reads your card, needs your card PIN and then generates a TOTP code. We
    have had those devices for eons, before smartphones even existed and
    they will probably be around for a long time for elderly people (like
    me! :-)).

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 20:10:01
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 12:05 PM, Carlos E.R. wrote:
    On 2026-04-23 19:57, AJL wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >> such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    Here it's by text or email depending on the organization. 2 factor
    authorization (2FA). On most of my accounts when I do the first log in and
    get the 2FA security code, I can authorize the device and from then on only
    the PW is needed on that device...



    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Thursday, April 23, 2026 22:41:09
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-23 22:00, Frank Slootweg wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2026-04-23 19:57, AJL wrote:
    [...]
    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >>> such as transferring out money to a perps account. Since I have no NEED of >>> those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    For our banks we can still use a bank-supplied hardware device which
    reads your card, needs your card PIN and then generates a TOTP code. We
    have had those devices for eons, before smartphones even existed and
    they will probably be around for a long time for elderly people (like
    me! :-)).

    My bank did not provide them, and does not, as far as I know. Maybe
    special clients.

    What it did was give us a card with 50 pin codes, and each time it would
    ask for a random pin of the lot.

    I have an old neighbour who I know doesn't have a smartphone, not even a simple mobile phone. I don't know how he handles the bank.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From AJL@3:633/10 to All on Thursday, April 23, 2026 22:16:51
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <noemail@none.com> wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >> such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    That is indeed not very secure.

    With 2FA it is reasonably secure. And security is in entering the app/site
    securely on a secure device, not the capabilities offered once inside.

    Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions

    Yup. My old phone can do that with financial apps too. However I think that
    most would agree that using sensitive apps on an almost 7 old non-updated
    phone is still unwise.

    to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I
    don't consider that secure enough.

    So you consider your not up to date phone safe for some apps but worry about
    a pin? Perhaps you should use more than a one digit pin... ;)



    [1] <https://en.wikipedia.org/wiki/DigiD>



    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Friday, April 24, 2026 14:09:20
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    AJL <noemail@none.com> wrote:
    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <noemail@none.com> wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    That is indeed not very secure.

    With 2FA it is reasonably secure. And security is in entering the app/site
    securely on a secure device, not the capabilities offered once inside.

    Yes, I saw that in another response (to Carlos) you mentioned that
    the app/site has a 'trust this device' facility, which indeed provides
    the needed security.

    Several people often whine about 2SV via SMS/e-mail not being secure,
    but if that's only what's offered, one has to deal with that.

    Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions
    [...]
    to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I >don't consider that secure enough.

    So you consider your not up to date phone safe for some apps but worry about
    a pin?

    We can get into the *phone* with a fingerprint or a PIN (can choose
    which one when you want to unlock the phone), but for the *banking
    apps*, it's (configurable) fingerprint *or* PIN. I.e. if you have
    configured for fingerprint, you can't get in with a PIN and vice versa.

    Perhaps you should use more than a one digit pin... ;)

    That's a splendid idea! Thanks much!

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Saturday, April 25, 2026 14:13:04
    Subject: Re: Q: What threats do we really face when our phones are not fully patched?

    On 2026-04-24 16:09, Frank Slootweg wrote:
    AJL <noemail@none.com> wrote:
    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <noemail@none.com> wrote:

    ...

    So you consider your not up to date phone safe for some apps but worry about >> a pin?

    We can get into the *phone* with a fingerprint or a PIN (can choose
    which one when you want to unlock the phone), but for the *banking
    apps*, it's (configurable) fingerprint *or* PIN. I.e. if you have
    configured for fingerprint, you can't get in with a PIN and vice versa.

    My bank app asks for a pin, but a button makes it ask for the
    fingerprint instead.

    Notice that the app uses the OS for the actual fingerprint code. The app
    did not ask me to "calibrate" with my finger, it just accepts that OS
    says "yes, this is the proper finger". Maybe it would accept my face as
    well, I have not tried. Generically, biometrics.



    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)