Editing 1934: Phone Security

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 8: Line 8:
  
 
==Explanation==
 
==Explanation==
 +
{{incomplete|Do NOT delete this tag too soon.}}
 +
 
This comic pokes fun at various phone security measures. At first, it covers some real measures, and then continues on to measures that are clearly somewhat overzealous or otherwise humorous. It is worth noting that all of the options are turned ON in the screen shown, so apparently the owner must be very afraid that their phone is going to be stolen, or just wants to see what will happen.
 
This comic pokes fun at various phone security measures. At first, it covers some real measures, and then continues on to measures that are clearly somewhat overzealous or otherwise humorous. It is worth noting that all of the options are turned ON in the screen shown, so apparently the owner must be very afraid that their phone is going to be stolen, or just wants to see what will happen.
These may be options that would appear on the [[:Category:xkcd Phones|xkcd Phone]], but that is not mentioned specifically, and this comic does not appear to be directly linked.
+
These may be options that would appear on the [[:Category:xkcd Phones|XKCD Phone]], but that is not mentioned specifically, and this comic does not appear to be directly linked.
  
The first two options: Set '''Passcode to Unlock''', and '''Erase phone after 10 failed unlock attempts''' are both real security measures found on many phones. The remaining options would rely on the fact that the phone could sense that it is stolen:
+
The first two options: Set '''Passcode to Unlock''', and '''Erase phone after 10 failed unlock attempts''' are both real security measures found on most phones.
 +
The additional options:
  
'''If stolen, phone can be remotely...''' The items on this sub-heading indicate the requirements of a separate device (i.e. the owner's laptop). The phrasing leaves it ambiguous whether they are only available when it is sensed to be stolen, or if they are simply indicators of whether the owner can perform the given actions when activated.
+
If phone is stolen it may be
* '''Tracked''': This would allow the police to catch the perpetrator and return your phone. This function is available on most modern phones in general but not bound to a specific situation.
+
* '''Tracked''': That would allow the police to catch the perpetrator and return your phone. This function is available on most modern phones.
* '''Erased''': This would prevent any sensitive data from being taken by a thief. This function is also available on most modern phones.
+
* '''Erased''': That would prevent any sensitive data from being taken by a thief. This is also available on most modern phones.
* '''Detonated''': This would likely harm the thief, possibly severely, depending on how the phone was detonated. The main problem with this approach (ignoring the possibility of manslaughter), is that if the phone is capable of detonation it's possible, by accident, glitch, or a malicious hacker, that the phone could detonate when not stolen, possibly hurting or killing the rightful owner. It is also possible for the detonation to harm innocent people who happen to be nearby when the feature is triggered. Phone batteries may produce an explosion if their temperature rises high enough, and contain circuitry both inside the battery and inside the logic of the phone to prevent this.
+
* '''Detonated''': That would likely harm the thief, possibly severely depending on how the phone was detonated. The main problem with this approach (ignoring the possibility of manslaughter), is that if the phone is capable of detonation it's possible that, by accident or glitch or a malicious hacker, the phone could detonate when not stolen, possibly hurting or killing the rightful owner. Many phone batteries will produce an explosion if their temperature rises high enough, and contain circuitry both inside the battery and inside the logic of the phone to prevent this.
  
'''If the phone is stolen, play an earsplitting siren until the battery dies or is removed''': This would be to draw attention to the thief, and discourage them from stealing future phones. Noticeably, it does not specify ''how'' the phone determines it is stolen, and, similar to the "detonate" option above, this has the potential to be an irritation if it is activated by accident, glitch, or hack.
+
'''If the phone is stolen, play an earsplitting siren until the battery dies or is removed''': This would be to draw attention to the thief, and discourage them from stealing future phones.
  
'''If the phone is stolen, do a fake factory reset. Then, in the background...''': This series of options is all humorous, indicating that the phone would allow the thief to think that it had factory reset, but the phone would, in fact, not do so, and would instead annoy the thief by doing various horrible things to them.
+
'''If the phone is stolen, do a fake factory reset. Then, in the background...''' :This series of options is all humorous, indicating that the phone would allow the thief to think that it had factory reset, but the phone would, in fact, not do so, and would instead foil the thief by doing various horrible things to them.
  
* '''...constantly request dozens of simultaneous rideshares to the phone's location''': This would cause tons of "rides" to show up at the stolen phone, leaving a lot of annoyed ridesharers, and possibly alerting the police to the thief's location. The thief may begin developing serious paranoia.
+
* '''Constantly Request Dozens of Simultaneous Rideshares to the Phone's Location''': This would cause tons of "rides" to show up at the stolen phone, leaving a lot of annoyed ridesharers, and possibly alerting the police to the thief's location. The thief may begin developing serious paranoia.
* '''...automatically order food to the phone's location from every delivery place within 20 miles''': This would be similar to the ridesharing issue, except it would be implied that the thief would be on the hook to pay for all of that delivered food. If not, this might arguably be the worst option in this menu, since not only would the owner of the phone have their phone stolen, they would also have hundreds of dollars of delivery bills. This could also lead the police to the thief.
+
* '''Automatically order food to the Phone's location from every delivery place within 20 miles''': This would be similar to the ridesharing issue, except it would be implied that the thief would be on the hook to pay for all of that delivered food. This could also lead the police to the thief.
* '''...if the thief logs into Facebook, send hostile messages to all their family members''': This has now deviated from things that could even possibly be useful, and is now just getting revenge on the thief, or potentially the person that the thief sells the phone to.
+
* '''If the thief logs into Facebook, send hostile messages to all their family members''': This has now deviated from things that could even possibly be useful, and is now just getting revenge on the thief, or potentially the person that the thief sells the phone to.
* '''...automatically direct self driving car to drive toward the phone's location at 5 mph''': This would cause a self driving car to follow the thief at a moderate jogging speed, or to run them over when the running ceases. This could absolutely catch the thief, but would also just be really, really creepy.
+
* '''Automatically direct self driving car to drive toward the phone's location at 5mph''': This would cause a self driving car to slowly follow the thief. This could absolutely catch the thief, but would also just be really, really creepy. This is similar to the plot of the movie "{{w|It Follows}}".
* '''...take photos of random objects at the thief's address and post them as "Free" on Craigslist or NextDoor''': Craigslist and NextDoor are sites that allow people to post advertisements for various things. Posting a large number of things for free would cause a lot of people to show up at the thief's residence, which can be found via GPS, requesting the free things, or, more humorously, if the thief was not home, people may just come by and take things, causing them to steal from the thief. This would be a humorous form of poetic justice.
+
* '''Take photos of random objects at the thief's address and post them as "Free" on Craigslist or NextDoor''': Craigslist and NextDoor are sites that allow people to post advertisements for various things. Posting a large number of things for free would cause a lot of people to show up at the thief's residence, which can be found via GPS, requesting the free things, or, more humorously, if the thief was not home, people may just come by and take things, causing them to steal from the thief. This would be a humorous form of poetic justice.
  
The title text extends the last category with: '''...wait until they type in payment information, then use it to order yourself a new phone.''' If the thief used the thief's own payment information, then this would be the ultimate in poetic justice, as it would basically say that the user does not care if their phone gets stolen, because the thief will end up unintentionally buying them a new one. If the thief were to complain about this, they would have to admit that they had stolen the first phone in order to do so, which they would be disinclined to do. However, if the thief used fraudulent or stolen payment information (whether stolen by the same thief or acquired online), then the replacement phone would be purchased with the payment information of the other victim, and when that person complained, the owner of the stolen phone would appear to be the person who stole the payment information, and might be arrested for that theft.  This is a very, very bad idea{{Citation needed}}.
+
The title text extends the last category with: Wait until they type in payment information, then use it to order yourself a new phone. This would be the ultimate in poetic justice, as it would basically say that the user does not care if their phone gets stolen, because the thief will end up unintentionally buying them a new one. If the thief were to complain about this, they would have to admit that they had stolen the first phone in order to do so, which they would be disinclined to do.
  
Note that all of these security measures, with the possible exception of the remote detonation, could theoretically be done by a security app on a typical smartphone, although the fake factory reset and most (if not all) of what follows would likely require a phone to be rooted and have a custom operating system installed. With the advent of open source phones such as the Librem 5, tricks such as these have become much easier for the average programmer to implement, and some may already exist in the wild. (Even the remote detonation might be possible on some phones that prevent battery explosions with software rather than physical circuitry.)
+
Note that all of these security measures, except for the remote detonation, could theoretically be done by a security app on a typical smartphone, although the fake factory reset and most (if not all) of what follows would likely require a phone to be rooted and have a custom operating system installed. With the advent of open source phones such as the Librem 5, tricks such as these have become much easier for the average programmer to implement, and some may already exist in the wild.
  
 
==Transcript==
 
==Transcript==
 +
{{incomplete transcript|We need green switches. Do NOT delete this tag too soon.}}
 
:[The content of a configuration screen on a smartphone is shown. All items listed are activated as indicated by green switches.]
 
:[The content of a configuration screen on a smartphone is shown. All items listed are activated as indicated by green switches.]
 
:Security Options
 
:Security Options
:* Passcode to unlock <small><span style="color:blue">(Set Code)</span></small>
+
:* Passcode to unlock <span style="color:blue">(Set Code)</span>
 
:* Erase phone after ten failed unlock attempts
 
:* Erase phone after ten failed unlock attempts
  

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)