{"id":3995,"date":"2016-11-19T08:39:35","date_gmt":"2016-11-19T13:39:35","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3995"},"modified":"2016-11-19T08:39:35","modified_gmt":"2016-11-19T13:39:35","slug":"android-backdoor-is-secretly-sending-user-data-and-texts-to-china-and-no-one-knows-why","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/11\/19\/android-backdoor-is-secretly-sending-user-data-and-texts-to-china-and-no-one-knows-why\/","title":{"rendered":"Android backdoor is secretly sending user data and texts to China, and no one knows why"},"content":{"rendered":"<p>This week, I came across this interesting article talking about certain low-end Android phones secretly communicating users\u2019 data and texts to China. In fact, this has been all over tech news all week, so I\u2019m sure most of you are already aware of this. To me, this raises two important security questions that have nothing to do directly to either Android or those low-end phone manufacturers.<\/p>\n<p>It\u2019s pretty evident that Android has been around for a while now. So, first, why did it take home land security so long to uncover something of this magnitude against American consumers? Secondly, this article\u2019s title mentions that \u201cNo one knows why,\u201d but I\u2019m wondering whether no one really didn\u2019t know why this has been going on and for how long if this security flaw claim is founded.<\/p>\n<p>Below is the Article.<\/p>\n<p>http:\/\/www.techrepublic.com\/article\/android-backdoor-is-secretly-sending-user-data-and-texts-to-china-and-no-one-knows-why\/<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, I came across this interesting article talking about certain low-end Android phones secretly communicating users\u2019 data and texts to China. In fact, this has been all over tech news all week, so I\u2019m sure most of you are already aware of this. To me, this raises two important security questions that have nothing [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-3995","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3995"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3995\/revisions"}],"predecessor-version":[{"id":3996,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3995\/revisions\/3996"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}