Mobile companies like Samsung and Apple tend to speak very highly of their security, and how they are very vested in ensuring the privacy of their customers. However, maybe it is because of their claims, these companies are also the ones who are prone to Hackers. Itβs like putting candy in front of a baby and telling him/her not to eat it. Isi liye shayad hackers tempt hoye aur unhoun nay kiya Samsung Galaxy kay source code hack.
What is a source code?
This is a very important question because the only source code most of us know is the movie starring Jake Gyllenhaal, and Michelle Monaghan. While the idea of the movie and the meaning of the actual word are more and less the same β there are still a few differences. Source Code is a text listing or a list of commands to be sent to a computer or a mobile device. They are usually written in computer-readable language programs and are different for each company i.e. Samsung, Apple, HTC, Nokia.
What happened with Galaxy Source Codes?
Samsung on Monday confirmed that they had a security breach by hackers by the name of βLapsus$β, who stole 190GB worth of internal data. They said, βThere was a security breach relating to certain internal company data,βΒ SamsungΒ toldΒ BloombergΒ in a statement.Β βAccording to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices but does not include the personal information of our consumers or employees. Currently, we do not anticipate any impact on our business or customers. We have implemented measures to prevent further such incidents and will continue to serve our customers without disruption,βΒ the company further added.
Do we have any Privacy in this era of the Internet?
This has been a question, which has popped a lot in the last some years. With the current usage of the internet, it seems that none of us have any privacy at all. Yes, the technology companies claim that they protect our data β but can we really believe them?
No. And quite simply we donβt have any privacy. If the recent Hollywood also proves our points. For instance, Fast and Furious 7 showed us Godβs eye β a simple computer program, which could locate a person anywhere on Earth within a span of nanoseconds. And this is just one example.
Should we stop using the Internet?
Now with all the privacy breaches and the concerns, which are of course very legitimate, the question remains β d we stop using the internet? No, we cannot. Our lives depend on it. All of our work and most of our education are solely based on the internet. And this is called evolution. We cannot go back to the stone age, but what we must do is weave very carefully. We need to be able to understand how to protect ourselves, and our privacy and the first step is to start reading all those agreement licenses.
The technological companies must all do all that they can to ensure that they protect our data and keep us safe. But no matter what, we can only go from this point forth. Peechay tou murh nahien saktay tou bus agay ka rasta thora dekh kar chalna hai. Umeed hai sab theek hi ho ga.
Pakistanβs First Ever Locally Assembled Smartphones Are Now Available