US builds stolen smartphone database

Source: Internet
Author: User
Keywords Stolen Intelligent Machine
November 29 foreign media reported that CTIA (US wireless Communications and Internet Association) local time announced in Wednesday, by the United States major mobile operators launched last April, the construction of the stolen smartphone database has been completed, than the scheduled November 30 deadline ahead of days. With the integration of similar databases with international mobile operators, the stolen smartphone database not only enables the United States, but also allows overseas mobile operators to block stolen 4G and 3G smartphones. But George Gasken George Gascón, the San Francisco district attorney, believes the new database may not be able to prevent the theft of smartphones, "the UK tried to build a similar database, but the theft of smartphones has not diminished". Gasken, in testimony last week, said that mobile operators involved in the stolen smartphone database project, including At&t, T, Sprint and Verizon, rejected the "kill switch" (cut off switch) program for fear of losing revenue from the smartphone insurance business. To further prevent the theft of smartphones through pre-installed software. CTIA says the kill switch software is not a viable option because of potential risks, such as hackers who can scrap smart phones that users normally use. Announcing the completion of the stolen smartphone database, CTIA also encouraged users to take other precautionary measures to prevent the theft of smartphones, including software to track stolen smartphones. "Another important element in preventing the theft of smartphones is consumers," said Steve Largent, CTIA's president and CEO Steve Lagent. In order to help users, we provide a series of users to download the application, can remotely delete, track, lock the stolen equipment. "Apple and Google now offer tracking software to find stolen smartphones, but only Apple has the" Activate Lock "feature available in the latest version of iOS, which allows users to remotely block stolen iphones and erase data from stolen handsets, activation said. To reuse the stolen iphone, users need to activate the phone with the same itunes account. Bamboo)
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.