Find Out Who’s Tracking You Through Your Phone

BRIGHT SIDE · 6,902,857 Просмотры
How to protect your privacy? How to stay safe while using your phone? Did you know that anyone can get your personal information and read your private messages? Here's a list of the most useful codes for smartphones all in one video, together with some instructions on how to detect intruders.
The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen if you dial *#21#.
It’s a good idea to dial ##002# you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.
People usually don’t reveal all that much in phone conversations. From the point of view of those who want to listen in, it’s much more worthwhile to set up special devices ("bugs") in someone’s home. Radio wave detectors can be used to work out whether such bugs are present in a building.
Determine what information it’s safe to make accessible to all. Be very careful when posting photographs of children. Only your mobile operator should ever offer you tracking services, and they should only turn them on with your explicit agreement. Websites and applications that offer to find out the location of other people are almost certainly acting with criminal intent.

*#21# 0:35
*#62# 1:21
##002# 1:42
*#06# 2:03
The James Bond Code 2:39
Use Anti-Virus Software 4:28
How do the secret services listen in? 5:05
How can you protect yourself from criminals and spies? 6:06


#phonehackers #phonetracking #protectphone

-With *#21#, you can find out whether your calls, messages and other data are being diverted.
-Dial *#62# if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you.
-##002# is a universal code for switching off all forms of redirection away from your phone.
-Dial *#06# to find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it.
-Special codes exist that allow someone to track your location and also to determine whether someone is following you. The ones to be suspicious of are mobile base stations — this could be a truck or small bus with a large antenna.
-If you use Android, you should periodically check your phone for viruses. PlaceRaider is one of the most dangerous ones that can infect your device.
-If a phone makes odd noises during a conversation, loses battery power rapidly, overheats, or unexpectedly restarts, this is merely an indication that you need to get it repaired rather than a telltale sign that you’re being listened to.
-Use messaging apps that are completely closed to outsiders, such as Telegram, Chare, Wickr, or Signal. Don’t install unknown programs on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can.

Subscribe to Bright Side :

Our Social Media:

5-Minute Crafts Youtube: 

For more videos and articles visit:

Вам также может понравиться..

6 Signs That Your Phone Has Been Hacked

6 Signs That Your Phone Has Been Hacked

With everything firmly manifested in the digital age the next logical step in our security seems to be encryption. How can we protect our private information, whether it be texts, phone calls, and/or emails, from potential hacking technology or big agencies? With new technology evolving every day, and everything now on the internet being easily accessible to everyone, what are some ways that we can protect ourselves and also ensure that we are not being spied on? If you’re wondering how to find out if your phone has been hacked, you’ve reached the right place! Whether you have an iphone, android, or something else, these tips are sure to help you out!

#Hacked #Smartphone #Security


6. Your Battery. If your smartphone starts to run out of battery really quickly it could be a sign that there is an unknown app running in the background of your phone. (Potentially one of those spy apps that was previously mentioned.) If you generally usually have pretty good battery life and start noticing that your battery is draining, it should raise red flags. This may also be due to hardware or software issues, but it is always best to take it to an electronics store or phone shop to rule out those possibilities.

5. Your phone keeps restarting or doing odd things. If your phone constantly restarts itself, turns off, starts apps and/or dials random numbers it could be a hacker trying to infiltrate your phone. It should always be a huge red flag if you start to notice that your phone is turning on and off or randomly doing things like closing or opening apps. And if you start to notice that your phone seems to be randomly dialing or texting numbers, that is another huge red flag - so keep an eye out for this type of strange behaviour.

4. Your phone is warm. If your iphone, android, or other device is constantly warm or hot despite you not using it that much, it could be another sign that there is an unidentified app running in the background. Generally, a phone should never be overheating. Cheating is a sign that it is being overused or potentially effective. If you notice that your phone has randomly started to overheat but you aren't using it or aren't running very any apps, then you may want to go get the phone checked out. Mobile devices should never be overheating, especially if you are not using it in excess. In the event that you do use your phone a lot, mobile devices in general should not get very warm. This could be a safety hazard, so make sure that you get your phone checked out if it starts to overheat!

Do you know what methods hackers use to try to hack mobile devices? Well, keep watching till the end to find out!

3. Unknown numbers. If there are unknown numbers in your ‘recent calls’ that could be a sign that someone is tinkering with your smartphone from abroad. If you do not recall getting any phone calls from unknown numbers, that is another warning sign. Just keep an eye on your recent calls list. If for some unusual reason you start to notice that there are a strange amount of unexplained unknown calls in your list, consider it a red flag.

2. Controlling your phone. If you cannot turn off your cell phone or control simple apps like brightness and the camera then it could be a hacker behind the deficiencies. You should always be able to have full control of your smartphone. If you cannot turn it off for some strange reason, or can’t even do simple things like change the volume, turn down the brightness, or even take a picture, it means that there is likely something wrong with your phone - and one of the possibilities is that a hacker is causing all the defects. A smartphone should always be easy to use, and when simple things start to seem difficult or nearly impossible to do, consider it another red flag!

1. Noises or echoes. And finally, if you regularly hear noises or echoes during your phone calls in places where that normally doesn’t occur then that could be suspicious as well. If you start noticing that you are hearing echoes during your phone calls in places where you have never experienced those kinds of issues before, beware. Echoes during phone calls could mean that someone is listening in on your conversation. If you start hearing other strange noises as well, those could also signify that your smartphone may be hacked.

Subscribe to Bestie :

Our Social Media:

10 Things You Should Never Share on Facebook

10 Things You Should Never Share on Facebook

Posting too much information on Facebook might be unsafe for you and your family. Here're 10 things you should delete from your Facebook. It can even help you protect your house from burglary while you are away!

Facebook. It “helps you connect and share with the people in your life.” And “it’s free and always will be.” It’s hard to find a person who has never seen these lines in their life.
Facebook has gone through a lot of transformations since its original launch in 2004 as a Harvard student network. Are you among those 2 billion people who belong to a $500 billion empire?

Your phone number 0:54
Friends who aren't your real friends 1:23
The mobile app 2:14
Personal information: your favorite books, music, and so on 3:02
Disable facial recognition 4:06
Your location on photo tags 5:11
Your credit card details 5:43
Your relationship status 6:04
Your birthday 6:50
Your “traveling to” status 7:20

- It might be a better idea not to give your phone number away to the world. After all, there are all kinds of people online – even on your big friends' list.
- Researchers believe a human can keep around 150 stable relationships. You don’t have to cut your friends list to that number, of course. But it might be a good idea to virtually let go of people you would rather not share your news and pictures with.  
- Tech World Zone was wondering, too, so they ran an independent test, which revealed that the Facebook app on Android phones takes at least 20% of your battery life. It turns out Facebook depletes the battery in the background whenever your phone is on.
- Everything Facebook knows about you is for advertising. While Facebook is “free and will always be” for you, it’s understandable it has to get money from someone else.
- Around 350 million photos are uploaded to Facebook every day. It means 4,000 photos appear on different users’ pages and in newsfeeds every second.
- If you tag your location once you are at home, everyone will be able to see where you live. Pictures with geotags from bars give away your partying locations where you might not want to see your ex or obsessive stalker, for example.
- Just don’t share your credit card details with anyone! If someone asks you to do it online, just don’t.
- You change your status back to single. Your friends tell you how he or she was never good enough for you, and you start posting status updates saying you feel “happy,” “inspired” and “better than ever!”... Sound a bit desperate, right?
- Your date of birth is actually very personal information and might be the puzzle piece someone might use to get access to your bank and other personal accounts. So it’s a good idea to keep it private.
- In fact, burglars who rob houses are also more than happy to see travel updates. Moreover, some insurance companies reject claims coming from those who got burgled while on vacation.

Subscribe to Bright Side :

Our Social Media:



SMART Youtube:

5-Minute Crafts Youtube:

For more videos and articles visit:
Secret Phone Codes You Didn't Know Existed!

Secret Phone Codes You Didn't Know Existed!

Thanks to Audible, this video's sponsor! Get 3 months for $6.95/mo, go to or text THIOJOE to 500-500 .

● More Tech Discussions ➤
● Subscribe Here ➤

⇒ Become a channel member for exclusive features! Check it out here:

Discord Server ⇨

My Gear & Equipment ⇨

#Technology #Tech
I Asked Siri "When The World Would End" And This Is What She Said..

I Asked Siri "When The World Would End" And This Is What She Said..

♨ I Asked Apple's Siri When The World Would End And This Is What She Said... More videos: / Suggested videos -

📌 If you have videos send it to and we will post it!

🏠 Support IMC -
🍀 Paypal Donation

🎥 Sources:
Big Thanks!
Background Pic Sent by Subscriber

🔥 Big Shout Out To Our Patron Members, including Ben & Amber, Angela Dawson , Angelica Daigle, Laurent Marin-Ramos

-Best videos Playlist -
-Popular Uploads -
-Prophecies of Strange Times Playlist -
-Conspiracy Playlist -
-Do Not Watch Alone!
-Biggest Secret They Dont Want You To Know
-Shocking Anomaly Caught On tape
-IMC Soundtrack 2017
-Disturbing Message To all Americans


The Impossible Channel is your source for reporting the best in Impossible Feats around the World such as UFOs, Aliens, Sightings, Weather Anomalies, Conspiracy and Underground news.


Long Note Four by Kevin MacLeod is licensed under a Creative Commons Attribution license (

Inappropriate content or flagged content will be removed from comments by moderator or admin.

All videos uploaded here are under the express permission of the original owner, or are in public domain falling under Fair Use for commentary, research, news reporting purposes under current copyright rules.
How to Avoid Surveillance...With Your Phone | Christopher Soghoian | TED Talks

How to Avoid Surveillance...With Your Phone | Christopher Soghoian | TED Talks

Who is listening in on your phone calls? On a landline, it could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But then again, so could a foreign intelligence service ... or a criminal. Which is why, says Soghoian, some tech companies are resisting governments' call to build the same backdoors into mobile phones and new messaging systems. Learn how some tech companies are working to keep your calls and messages private.

TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design -- plus science, business, global issues, the arts and much more.
Find closed captions and translated subtitles in many languages at

Follow TED news on Twitter:
Like TED on Facebook:

Subscribe to our channel: