The powerful truth - All those “smart” devices…
You’re down the pub talking about some crazy interest of yours and then you go back home and open your commonly used apps and wow—they are showing you adverts for that exact crazy interest you were talking about.
It seems just like a spooky coincidence- maybe you accidentally clicked on something. You are not the only one—a lot of people experienced similar stories.
But, no, no and no. It is not a sci-fi story, you are not paranoid, you haven’t clicked on something and no- there is no such thing as coincidence.
And finally YES- your devices are listening to you.

Well, those would be — apps you are using every day: Facebook, Twitter, LinkedIn, WhatsApp, SnapChat, Instagram, Viber.
In 2017, Felix Krause explained what app can do when user grants an app access to their microphone or camera:
Edward Snowden revealed an NSA program called Optic Nerves, which represents a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
The Metasploit app on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. Then you can alter the PDF with the program, send the user the malicious file and when they open it – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too.
IoT
And yes – there is more… As people increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and society as a whole.
The number of these “internet of things” devices is climbing into the tens of billions. They’re creating an interconnected world with the goal to make people’s lives more enjoyable, productive, secure, and efficient. But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.
Read more: Security Land Topic
And yes – all those games … Fortnite is the most popular video game in the world, and with that popularity comes the threat of cyber attacks designed to steal users’ personal information and gain access to their accounts.
The latest vulnerability found in the game, however, let hackers spy on players using their computers’ microphones.
As Dylan Curran said: “How would we feel if someone were standing outside our bedroom window, staring in through the curtains. The most common response would be to call the police. However, what do we do when everyone is being monitored? We shake our head, and try to forget it’s happening. Try to go on with our lives and ignore the constant nag that we’re being watched.
If this article achieves anything, I hope it teaches you digital mindfulness. ”