{"id":640,"date":"2024-04-07T03:52:07","date_gmt":"2024-04-07T07:52:07","guid":{"rendered":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/"},"modified":"2024-04-07T03:52:07","modified_gmt":"2024-04-07T07:52:07","slug":"understanding-the-vulnerabilities-in-selling-your-phone","status":"publish","type":"post","link":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/","title":{"rendered":"Understanding the Vulnerabilities in Selling Your Phone"},"content":{"rendered":"<p>Our phones are housed with a plethora of personal information. So, do we really understand how secure is this vast data? Some of the recent events have shed light on the importance of safeguarding our information.<\/p>\n<p>According to cybersecurity researcher Somdev Sangwan, one of the most common ways our data gets compromised is when we sell our phones without erasing sensitive information properly. Do know that that simply deleting data is not enough. Hence, it is suggested to add some \u201cjunk data\u201d before deleting the data.<\/p>\n<p>Moreover, it is also important to know how we lock your phone. Is it that we are using a PIN, fingerprint or facial recognition? Each method has its vulnerabilities. The researcher adds that even facial recognition can be bypassed with clever tricks.<\/p>\n<p>But it is not just about physical access. Sangwan explains that leaked software or tools which are used to unlock our devices can also pose a threat to everyone\u2019s security. This is the reason it is suggested to maintain good password hygiene.<\/p>\n<p>Now, w it comes to cloud services such as iCloud, security measures does exist to a great extent. However, these are also not foolproof.<\/p>\n<p>Well, what if law enforcement wants access to the phone data? It is said that while authorities have the power to seize devices for investigation, citizens also have rights. It is learned that refusing to share passwords or data is within the rights of the citizens and it is outlined in Article 20(3) of the Indian Constitution.<\/p>\n<p>In one of the recent legal rulings the Delhi High Court reinforced such protections and stated that individuals cannot be forced to disclose passwords. The court cited the right against self-incrimination.<\/p>\n","protected":false},"excerpt":{"rendered":"<div>Our phones are housed with a plethora of personal information. So, do we really understand how secure is this vast data? Some of the recent events have shed light on the importance of safeguarding our information. According to cybersecurity researcher Somdev Sangwan, one of the most common ways our data gets compromised is when we [\u2026]<\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[93,67,743,768,769,1],"tags":[10],"class_list":["post-640","post","type-post","status-publish","format-standard","hentry","category-big-data","category-cybersecurity","category-data-safety","category-phone-data","category-phone-password","category-top-ai-news","tag-aimastermindscourse-aimastermind-aicourses-getcertifiedinai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog\" \/>\n<meta property=\"og:description\" content=\"Our phones are housed with a plethora of personal information. So, do we really understand how secure is this vast data? Some of the recent events have shed light on the importance of safeguarding our information. According to cybersecurity researcher Somdev Sangwan, one of the most common ways our data gets compromised is when we [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Mastermind Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-07T07:52:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abbey4323\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@aimastermindco\" \/>\n<meta name=\"twitter:site\" content=\"@aimastermindco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbey4323\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\"},\"author\":{\"name\":\"abbey4323\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/9ad25e00282b80219b15f1f2d0892861\"},\"headline\":\"Understanding the Vulnerabilities in Selling Your Phone\",\"datePublished\":\"2024-04-07T07:52:07+00:00\",\"dateModified\":\"2024-04-07T07:52:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\"},\"wordCount\":289,\"publisher\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#organization\"},\"keywords\":[\"#aimastermindscourse #aimastermind #aicourses #getcertifiedinai\"],\"articleSection\":[\"Big Data\",\"cybersecurity\",\"Data Safety\",\"Phone Data\",\"Phone Password\",\"Top AI News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\",\"url\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\",\"name\":\"Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog\",\"isPartOf\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#website\"},\"datePublished\":\"2024-04-07T07:52:07+00:00\",\"dateModified\":\"2024-04-07T07:52:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/aimastermindscourse.com\/getcertified\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Vulnerabilities in Selling Your Phone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#website\",\"url\":\"https:\/\/aimastermindscourse.com\/getcertified\/\",\"name\":\"AI Mastermind Blog\",\"description\":\"Applying Artificial Intelligence in Everyday Life\",\"publisher\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#organization\"},\"alternateName\":\"aimastermindscourse.com\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aimastermindscourse.com\/getcertified\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#organization\",\"name\":\"AI Mastermind Blog\",\"url\":\"https:\/\/aimastermindscourse.com\/getcertified\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png\",\"contentUrl\":\"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png\",\"width\":600,\"height\":343,\"caption\":\"AI Mastermind Blog\"},\"image\":{\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/aimastermindco\",\"https:\/\/www.linkedin.com\/company\/ai-mastermind-course\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/9ad25e00282b80219b15f1f2d0892861\",\"name\":\"abbey4323\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/228dbb023e11f78c9917991b54566b846cb44d66f6e273c864d2e5b0237429f4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/228dbb023e11f78c9917991b54566b846cb44d66f6e273c864d2e5b0237429f4?s=96&d=mm&r=g\",\"caption\":\"abbey4323\"},\"url\":\"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/author\/abbey4323\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog","og_description":"Our phones are housed with a plethora of personal information. So, do we really understand how secure is this vast data? Some of the recent events have shed light on the importance of safeguarding our information. According to cybersecurity researcher Somdev Sangwan, one of the most common ways our data gets compromised is when we [\u2026]","og_url":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/","og_site_name":"AI Mastermind Blog","article_published_time":"2024-04-07T07:52:07+00:00","og_image":[{"width":600,"height":343,"url":"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png","type":"image\/png"}],"author":"abbey4323","twitter_card":"summary_large_image","twitter_creator":"@aimastermindco","twitter_site":"@aimastermindco","twitter_misc":{"Written by":"abbey4323","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#article","isPartOf":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/"},"author":{"name":"abbey4323","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/9ad25e00282b80219b15f1f2d0892861"},"headline":"Understanding the Vulnerabilities in Selling Your Phone","datePublished":"2024-04-07T07:52:07+00:00","dateModified":"2024-04-07T07:52:07+00:00","mainEntityOfPage":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/"},"wordCount":289,"publisher":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/#organization"},"keywords":["#aimastermindscourse #aimastermind #aicourses #getcertifiedinai"],"articleSection":["Big Data","cybersecurity","Data Safety","Phone Data","Phone Password","Top AI News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/","url":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/","name":"Understanding the Vulnerabilities in Selling Your Phone - AI Mastermind Blog","isPartOf":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/#website"},"datePublished":"2024-04-07T07:52:07+00:00","dateModified":"2024-04-07T07:52:07+00:00","breadcrumb":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/2024\/04\/07\/understanding-the-vulnerabilities-in-selling-your-phone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aimastermindscourse.com\/getcertified\/"},{"@type":"ListItem","position":2,"name":"Understanding the Vulnerabilities in Selling Your Phone"}]},{"@type":"WebSite","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#website","url":"https:\/\/aimastermindscourse.com\/getcertified\/","name":"AI Mastermind Blog","description":"Applying Artificial Intelligence in Everyday Life","publisher":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/#organization"},"alternateName":"aimastermindscourse.com","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aimastermindscourse.com\/getcertified\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#organization","name":"AI Mastermind Blog","url":"https:\/\/aimastermindscourse.com\/getcertified\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/logo\/image\/","url":"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png","contentUrl":"https:\/\/aimastermindscourse.com\/getcertified\/wp-content\/uploads\/2024\/01\/ai-mastermind.png","width":600,"height":343,"caption":"AI Mastermind Blog"},"image":{"@id":"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/aimastermindco","https:\/\/www.linkedin.com\/company\/ai-mastermind-course\/"]},{"@type":"Person","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/9ad25e00282b80219b15f1f2d0892861","name":"abbey4323","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aimastermindscourse.com\/getcertified\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/228dbb023e11f78c9917991b54566b846cb44d66f6e273c864d2e5b0237429f4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/228dbb023e11f78c9917991b54566b846cb44d66f6e273c864d2e5b0237429f4?s=96&d=mm&r=g","caption":"abbey4323"},"url":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/author\/abbey4323\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/posts\/640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/comments?post=640"}],"version-history":[{"count":0,"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/posts\/640\/revisions"}],"wp:attachment":[{"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/media?parent=640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/categories?post=640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aimastermindscourse.com\/getcertified\/index.php\/wp-json\/wp\/v2\/tags?post=640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}