Monday, 30 September 2024

Discover The Fun Side of AI Snacks! At No Cost!

 

Ever had a craving but you are unsure what you want to snack on? Sometimes it's so bad that you stand in front of the fridge staring at what is there and still cannot decide...

AI can help! Below I have asked two different AI systems to analyse the same picture of the inside of a fridge and lets see what they come up with.

The rules:

  • Both AI systems get the same prompt along with an upload of the same picture
  • No explaining the contents of the fridge. The AI needs to provide its "best guess"
  • AI systems must be different.There are many websites claiming to be  a new AI but in effect they are just a web front page linked to ChatGPT in the background.
  • Both AI systems will get a second round prompt to increase the ingredients.


Lets start with Gemini, the Google AI and next will be ChatGPT4. For both AI systems I started by uploading the picture of the contents of the refrigerator and then used this prompt to ask what can be made:

"Analyse the image of the contents of the fridge and tell me what I can make"

Gemini:

 After the picture uploaded and the prompt was sent, Gemini only took a few seconds to start responding with the following:

Based on the image of your fridge, here are some meal ideas you could consider:

Breakfast:

  • Scrambled eggs with toast
  • Oatmeal

Lunch or dinner:

  • Sausage and vegetable stir-fry
  • Egg salad sandwiches
  • Rice and vegetable curry

Snacks:

  • Hard-boiled eggs
  • Fruit
  • Vegetables with hummus

Remember to check the expiration dates of your food before consuming it.

 
Gemini did provide ideas and even warns you at the end of the list about the expiry dates. It did assume a few ingredients such as the sausage used in the vegetable stir-fry and also suggested the use of a few spices or ingredients like onions that were not included in the image.
 

ChatGPT4:

As with the previous AI, the picture was uploaded and the same prompt was sent. Here is ChatGPT4's answer after a few seconds of thinking:

Based on the image of your fridge, here are the main items I can see:

  1. Eggs (on the top shelf)
  2. Noodles or pasta (packaged on the right of the top shelf)
  3. Yogurt (visible in a large container, possibly plain or fruit-flavoured)
  4. Packaged vegetables like carrots (bottom shelf)
  5. A black plastic bag that might contain more vegetables or other items (it's unclear what's inside)

Meal Ideas:

  1. Omelette or Scrambled Eggs:.

  2. Noodles with Eggs:

  3. Vegetable Stir-fry with Noodles:

  4. Egg Salad or Yogurt Dip:

Do any of these ideas fit what you're in the mood for? Let me know if you have other ingredients that are hidden in the black bag, and I can provide more suggestions!

ChatGPT4 first listed the ingredients and then suggested what can be made but did not assume any ingredients other than hinting that there might be more vegetables inside one of the bags. 

So how do you make it fun?


Both ChatGPT4 and Gemini replied with rather boring lists of meals or snacks. They both tried to cover a few options so they were definitely giving good responses. And that was mainly because of the limited amount of ingredients visible in the uploaded picture.

So, lets change that. It is now very easy to either upload a picture of what you have in your freezer, along with a picture or two of what you have in your cupboards or pantry, and greatly increase the amount of ideas both AI's will reply with. Lets add just five common extra ingredients and see how the answers change. Here is the prompt:

"Using the previous information add the following five ingredients and provide me with a new summarised list of meals or snacks. 1. Sliced ham 2. Tomato 3. Mince meat 4. Crackers 5. Cheese"

Here is the reply from Gemini:

Updated Meal and Snack Ideas

Based on the additional ingredients you've provided (sliced ham, tomato, mince meat, crackers, cheese), here are some new meal and snack ideas:

Meals:

  • Ham and Cheese Sandwich: Create a classic sandwich using sliced ham, cheese, and tomato on your favourite bread.
  • Mince Meat Pasta: Cook mince meat, add your favourite pasta sauce, and toss with pasta. Serve with grated cheese on top.
  • Ham and Cheese Omelet: Make a delicious omelet with eggs, ham, cheese, and tomatoes.
  • Ham and Cheese Pizza: If you have pizza dough, you can create a home-made pizza with ham, cheese, and tomato sauce.

Snacks:

  • Ham and Cheese Roll-ups: Wrap sliced ham and cheese in crackers for a quick and easy snack.
  • Cheese and Crackers: A classic pairing that's always a satisfying snack.
  • Ham and Tomato Sandwich: Use sliced ham and tomato on a cracker for a light and flavourful snack.

Here is the reply from ChatGPT4:


Ingredients Available:

  1. Eggs
  2. Noodles or pasta
  3. Yogurt
  4. Carrots
  5. Sliced ham
  6. Tomato
  7. Minced meat
  8. Crackers
  9. Cheese

Updated Meal & Snack Ideas:

  1. Ham and Cheese Omelette: Make an omelette with eggs, adding sliced ham, cheese, and diced tomatoes.

  2. Tomato, Ham, and Cheese Crackers: Top crackers with slices of tomato, ham, and cheese for a quick and easy snack.

  3. Mince Meat and Tomato Noodles: Cook noodles, sauté minced meat, and toss with diced tomatoes and cheese for a hearty meal.

  4. Egg and Veggie Stir-fry with Minced Meat: Stir-fry carrots, any other vegetables, and minced meat with eggs for a protein-rich meal. Serve over noodles or on its own.

  5. Cheesy Meatballs: Mix the minced meat with cheese and form meatballs. Fry or bake them and serve with noodles or crackers on the side.

  6. Ham and Cheese Stuffed Omelette: Make a stuffed omelette with ham, cheese, and tomatoes. You could also add sautéed minced meat for extra flavour.

  7. Yogurt Veggie Dip with Crackers: Use the yogurt as a base for a veggie dip. Add grated carrots and serve with crackers.


Conclusion

Both AI systems can provide great ideas for meals or snacks and will even be able to explain in detail how to prepare and cook something if asked for more detail. So if you are lazy and don't feel like typing out your ingredients in the prompt, run along to your kitchen, snap a few photos of the fridge and storage spaces you have, upload them to your favourite AI, and make it do all the work of thinking on how to solve that craving.

Enjoy the snacks!






Sunday, 29 September 2024

ChatGPT4 + ESP32 = Space Invaders game!


Now that the new version of OpenAI's GPT-4 is available, I thought I would give it a test and see how well it can write code for the ESP32 modules. There were a few rules imposed so that I could judge how much better the new version is compared to the last.

Here are the prerequisites:

  • Only one prompt allowed to request the writing of the game. No editing of prompt once request has been uploaded
  • Code must be copied and pasted directly from ChatGPT-4 directly to Arduino IDE 2.2  No code review or code adjustments.
  • ESP32 to be wired as per ChatGPT-4's code
  • Installation of missing libraries will be allowed
  • Code must upload to ESP32 device without errors and game must run without major problems

Lets dive in and see how OpenAI's GPT-4 did when asked to create a Space Invaders retro game for an ESP32 device.

1. The Prompt:

The prompt needed to worded with as much information needed so that OpenAI's GPT-4 knows exactly what the goal is, what hardware is available and which platform the Space Invaders game will run on.

Below in quotes is the original, once off prompt:

"Write me a small space invader game in C or C++ that can run on an esp32 with a 128×64 pixel oled screen attached and one joystick as a controller. Can also use one button for firing missiles at the space invaders"

As you can see, the hardware is defined as an EP32 module without specifying which version or chip. Define the size of the OLED screen in pixels. Use a joystick to move the ship around and use a button to fire. Some joysticks do have a built in switch, but I left it up to ChatGPT-4 to decide on the button wiring. Either by using the joystick built in switch or by wiring a separate switch, depending on the code that will be spat out.

2. ChatGPT-4's response:

Creating a simple "Space Invader" game for an ESP32 with a 128x64 OLED screen and a joystick involves several key steps, including handling the display, joystick input, and game logic. You can use libraries like U8g2 or Adafruit_GFX for OLED rendering and the built-in Wire library for I2C communication with the OLED display.

Here's a minimal version of the game written in C++ for an ESP32 using the U8g2 library for drawing on the screen. The joystick will control the player's movement, and a button will fire missiles.
Hardware setup:

    OLED Display: Connected to ESP32 via I2C (SCL and SDA).
    Joystick: Analog joystick with two axes (X and Y) connected to analog pins.
    Button: Connected to a digital pin for firing.

Required Libraries:

    U8g2 for the OLED display: U8g2
    Wire for I2C communication with the display.

Game Overview:

    The player moves a small ship left or right using the joystick.
    Pressing the button fires a missile toward the invading aliens.
    Simple alien sprites move horizontally and descend slowly.

3. ChatGPT-4´s code:

#include <Arduino.h>
#include <U8g2lib.h>

// OLED Display (128x64) using I2C
U8G2_SSD1306_128X64_NONAME_F_HW_I2C u8g2(U8G2_R0, /* reset=*/U8X8_PIN_NONE, /* clock=*/SCL, /* data=*/SDA);

// Joystick Pins
const int joystickX = 34; // X-axis pin (ADC)
const int buttonPin = 35; // Fire button pin (Digital)

// Constants
const int screenWidth = 128;
const int screenHeight = 64;
const int shipWidth = 10;
const int shipHeight = 4;
const int alienWidth = 8;
const int alienHeight = 5;
const int maxAliens = 5;

// Player variables
int playerX = screenWidth / 2 - shipWidth / 2;
int missileX = -1, missileY = -1; // No missile initially
bool missileActive = false;

// Alien variables
int alienX[maxAliens], alienY[maxAliens];
int alienDirection = 1; // 1 for right, -1 for left
int alienSpeed = 1; // Speed of alien movement

// Button and joystick state
int lastButtonState = LOW;
int joystickValueX = 0;

// Initialize aliens at the top of the screen
void initAliens() {
for (int i = 0; i < maxAliens; i++) {
alienX[i] = i * (alienWidth + 10);
alienY[i] = 10;
}
}

// Setup function
void setup() {
u8g2.begin(); // Initialize the display
pinMode(buttonPin, INPUT);
initAliens();
}

// Draw the player ship
void drawShip(int x) {
u8g2.drawBox(x, screenHeight - shipHeight - 2, shipWidth, shipHeight);
}

// Draw aliens
void drawAliens() {
for (int i = 0; i < maxAliens; i++) {
if (alienY[i] >= 0) { // Only draw aliens that are alive
u8g2.drawBox(alienX[i], alienY[i], alienWidth, alienHeight);
}
}
}

// Draw missile if active
void drawMissile() {
if (missileActive) {
u8g2.drawPixel(missileX, missileY);
}
}

// Update alien positions
void updateAliens() {
for (int i = 0; i < maxAliens; i++) {
alienX[i] += alienDirection * alienSpeed;
}

// Change direction when an alien hits the screen edge
for (int i = 0; i < maxAliens; i++) {
if (alienX[i] <= 0 || alienX[i] + alienWidth >= screenWidth) {
alienDirection *= -1;
for (int j = 0; j < maxAliens; j++) {
alienY[j] += 5; // Move aliens down
}
break;
}
}
}

// Update missile position
void updateMissile() {
if (missileActive) {
missileY -= 2; // Move missile up
if (missileY < 0) {
missileActive = false; // Missile goes off screen
}

// Check for collision with aliens
for (int i = 0; i < maxAliens; i++) {
if (alienY[i] >= 0 && missileX >= alienX[i] && missileX <= alienX[i] + alienWidth &&
missileY >= alienY[i] && missileY <= alienY[i] + alienHeight) {
alienY[i] = -1; // Alien hit, remove it
missileActive = false; // Missile disappears
}
}
}
}

// Update player position based on joystick
void updatePlayer() {
joystickValueX = analogRead(joystickX);
playerX = map(joystickValueX, 0, 4095, 0, screenWidth - shipWidth);
}

// Handle button press to fire missile
void handleButton() {
int buttonState = digitalRead(buttonPin);

if (buttonState == HIGH && lastButtonState == LOW && !missileActive) {
// Fire a missile
missileX = playerX + shipWidth / 2;
missileY = screenHeight - shipHeight - 3;
missileActive = true;
}

lastButtonState = buttonState;
}

// Main loop
void loop() {
// Update game state
updatePlayer();
updateAliens();
updateMissile();
handleButton();

// Draw everything
u8g2.clearBuffer();
drawShip(playerX);
drawAliens();
drawMissile();
u8g2.sendBuffer(); // Refresh the screen

delay(50); // Control the game speed
}

 


The above code was then copied and pasted directly to the Arduino IDE 2.2. The only change to the Arduino IDE 2.2 that I needed to make was to install the U8g2, which is available in the Arduino library manager.

All comments and descriptions were automatically added by ChatGPT-4, no changes were made between copying and pasting this code into the Arduino IDE. 

There are other OLED libraries available for the type of screen defined in the prompt but this is what ChatGPT-4 specified in the code and therefore the library was downloaded and used without any changes.


4. The Results:

The ESP32 and other hardware were then wired as per the pins used in the code onto a breadboard. The ESP32 was connected with a USB C cable to a computer and the code was uploaded via the Arduino IDE. No errors were reported and the code was uploaded successfully to the ESP32 module.

Here is a video of the Space Invaders game in action:

Conclusion

Does it work....YES! 

Is it playable without any modification...YES!  

For ChatGPT-4 to be able to code a game from a short prompt in a few seconds is a vast improvement on the previous versions. The game obviously needs some tweaking, and can be made to look and handle better with some code changes. The size of the screen greatly limits what can be shown and affects the quality and shapes of the graphics but that is not a fault from ChatGPT-4's side.

Sorry for the shaky camera work in the video, it was a bit difficult recording with one hand while moving the joystick with the other, all while looking at the OLED screen. Hope you enjoyed the blog, Cheers!




Wednesday, 25 September 2024

Why Strong Passwords Are Essential for Internet Security



In today’s digital age, having strong passwords is more important than ever. With so much of our lives conducted online, from banking and shopping to social media and work, protecting our personal information is crucial. Let’s explore why strong passwords matter and how you can create effective ones.


Protecting Your Personal Information

Weak passwords can be easily guessed or cracked, putting your sensitive data at risk. This can include anything from your email to your financial information. A compromised password can lead to identity theft, financial loss, and a host of other issues.

Preventing Unauthorized Access

Cybercriminals use sophisticated tools to attempt to gain access to accounts. A strong password acts as a barrier, making it much harder for them to succeed. By using complex passwords, you significantly reduce the likelihood of falling victim to hacking attempts.

Safeguarding Multiple Accounts

Many people use the same password across multiple sites, which is risky. If one account is compromised, all your other accounts are at risk too. Strong, unique passwords for each account help protect you from widespread damage.

How to Create Strong Passwords

Creating strong passwords doesn’t have to be complicated. Here are some tips to help you decide what password to use:

1. Use a Combination of Characters

A strong password should include a mix of uppercase letters, lowercase letters, numbers, and special symbols (e.g., !, @, #). Aim for at least 12-16 characters for added security.

2. Avoid Common Words or Phrases

Steer clear of easily guessable information like names, birthdays, or common words. Cybercriminals often use dictionaries to crack passwords, so make your password unique and unpredictable.

3. Consider a Passphrase

Instead of a single word, think about creating a passphrase—several words strung together. For example, “NotYourPetsName!Blob$2024” is much stronger than “mypetsname123.”

4. Personalize Your Password

Make your password memorable by associating it with a personal story or image. For instance, use the initials of a favourite book or song combined with numbers and symbols.

5. Use a Password Manager

If remembering complex passwords feels daunting, consider using a password manager. These tools can generate strong passwords for you and store them securely, so you only need to remember one master password.

Password Strength

Here is an example of a weak password and the estimated time it could take to crack it with brute force password cracking:


As you can see the password can be cracked in under a second and is not secure at all.

Below is an example of a strong password. Using the tips from above to combine a passphrase, upper and lower case letters, some special characters and numbers the amount of time taken to brute force a password dramatically changes:


Conclusion

Investing time in creating strong passwords is essential for protecting your online presence. By using a combination of characters, avoiding common phrases, and considering a passphrase, you can significantly enhance your security. Remember, a strong password is your first line of defence against cyber threats, so take the necessary steps to safeguard your information today. Stay secure and surf smart!


 

Monday, 23 September 2024

Wi-Fi Extender. Fix that Wi-Fi dead zone

WiFi not reaching all areas of house

Depending on the layout of your house or apartment, and where the router for the internet is located, you might have areas that do not have any connectivity.

The cause of the dead spots are not always distance to the router. Many times there are reinforced metal and concrete support walls or other structures/electrical installations in the way that are either blocking the signal or significantly reducing the range in a specific direction.

Installing a second router to be used as a gateway to make sure the entire building has coverage is a great idea, but routing cables is not always an option. If the construction allows for easy installation of new cabling, a hard wired option is always ideal as it provides the best connectivity and speeds. 

This could be for any part of your house/apartment/work space/building, including areas that are outside. For example, you might have a porch or deck on the opposite side of the house to where the router is, and you would like to sit and relax there while streaming sports or music to your phone.

So what do you do if you need to extend the coverage? The easiest is to buy and install a Wi-Fi extender. They are relatively easy to connect and configure for use, and only require a power outlet in the general direction of the dead spot.


They come in a large range of sizes, shapes and colours as well as different output powers. The majority of them will also have a standard RJ45 network connector so a device can be hard wired to the extender if needed.

How do you position/connect/use the Wi-Fi extender? Follow the tips below to help you get the optimal placement for best coverage.


Where is the best installation point for the Wi-Fi extender:

Typically installed halfway between your router and the area with weak signal.

  1. Signal Strength:  Place the extender where it still receives a strong signal from the router (at least 50% signal strength).

  2. Avoid Obstacles: If possible, keep it away from thick walls, metal objects, and appliances like microwaves that can interfere with the signal.

  3. Central Location: Ideally, it should be in a central location in your home to maximize coverage in all directions.

  4. Test Performance: After installation, test the Wi-Fi speed and signal strength in the areas you want to improve. You might need to adjust its position for optimal performance.

 

How do you set up a Wi-Fi extender:

1. Unbox and Plug In

  • Unpack your Wi-Fi extender and plug it into a power outlet midway between your router and the area with a weak signal.

2. Connect to the Extender

  • Use a smartphone, tablet, or computer to connect to the extender’s default Wi-Fi network. This network usually has the extender's brand name in it (check the label/manual for details).

3. Access the Setup Page

  • Open a web browser and enter the extender’s IP address (often something like 192.168.0.1 or a specific URL provided in the manual).
  • You may need to log in with a default username and password (often found on the device or in the manual).

4. Follow the Setup Wizard

  • Most extenders have a setup wizard that guides you through the process. Select your existing Wi-Fi network from the list and enter your Wi-Fi password.

5. Choose the Extender Network Name (Optional)

  • You can either keep the same name as your existing network (which allows for seamless roaming) or create a new one.

6. Finish and Reboot

  • Complete the setup, and the extender may reboot. Once it's done, reconnect your device to the new Wi-Fi network.

7. Test the Connection

  • Move to the areas where you needed better coverage and test the Wi-Fi speed and signal strength.

8. Adjust Position if Necessary

  • If the signal isn’t strong enough, try moving the extender a bit closer to the router or adjusting its position for better performance.

And that is how easy it is to extend the coverage inside or outside of your home. No cables needed and the installation is very quick and easy.  A standard Wi-Fi extender should provide an extra 100 feet/30 meters of extra coverage depending on factors like obstructions and interference.



 



 

 

Friday, 20 September 2024

Easily Find Your Camera's IP and Change the Default Password

 

IP cameras are essential for modern security systems, but ensuring their safety and functionality requires knowing how to access their settings. One critical step is finding the camera's IP address and changing the default password. This guide will walk you through the simplest methods to accomplish these tasks.

 

Finding an IP Camera's IP Address

1. Use the Manufacturer’s Software

Most IP camera manufacturers provide software tools that can automatically detect your camera's IP address on the network. Here’s how to use it:

  • Download the Software: Visit the manufacturer’s website and download the recommended software for your camera model.
  • Install and Run: Follow the installation instructions and run the software.
  • Scan for Devices: Use the software to scan your network. It should list all connected devices, including your camera, along with its IP address.

2. Check Your Router’s Admin Interface

Your router keeps a record of all connected devices, including their IP addresses. Here’s how to access it:

  • Log into Your Router: Open a web browser and enter your router's IP address (commonly 192.168.1.1 or 192.168.0.1). Refer to your router’s manual if these don’t work.
  • Enter Credentials: Log in using your admin credentials (often found on a sticker on the router).
  • Find Connected Devices: Navigate to the “Connected Devices” or “DHCP Client List” section. Look for your IP camera in the list and note its IP address.

3. Use Command Prompt (Windows)

If you prefer a more hands-on approach, the Command Prompt can help you discover devices on your network:

  • Open Command Prompt: Press Windows + R, type cmd, and hit Enter.
  • Run the ARP Command: Type arp -a and press Enter. This command will display a list of devices on your network, along with their IP addresses. Identify your camera’s IP from the list.

4. Mobile Apps

Many manufacturers offer mobile apps for easy camera management:

  • Download the App: Install the official app corresponding to your camera model.
  • Connect to the Same Network: Ensure your mobile device is connected to the same Wi-Fi network as the camera.
  • Detect Devices: Open the app, and it should automatically find and display the camera along with its IP address.

Changing the Default Password

Once you have the IP address, the next step is to secure your camera by changing the default password. Here's how to do it:

1. Access the Camera’s Web Interface

  • Open a Web Browser: Enter the camera’s IP address into the address bar and press Enter.
  • Login Prompt: You’ll be prompted for a username and password. Use the default credentials found in the camera's manual or on the manufacturer's website.

2. Navigate to the Settings

  • Locate the Security Settings: Once logged in, look for sections like “Settings,” “Administration,” or “Security.”
  • Find Password Options: There should be an option to change the password.

3. Create a Strong Password

  • Use a Unique Password: Combine upper and lower case letters, numbers, and special characters. Avoid easily guessable information.
  • Confirm Changes: Enter the new password and save the changes.

4. Logout and Test the New Credentials

  • Logout of the Interface: Once the password has been changed, log out.
  • Re-login: Use the new password to ensure it works correctly.

Additional Security Tips

  • Regularly Update Firmware: Keep your camera's firmware updated to protect against vulnerabilities.
  • Disable UPnP: If not needed, disable Universal Plug and Play (UPnP) on your router and camera settings to prevent unwanted access.
  • Use VPNs for Remote Access: If accessing your camera remotely, consider using a VPN for additional security.

Conclusion

Finding your IP camera's IP address and changing its default password are straightforward yet crucial tasks in securing your home or business. By following the steps outlined above, you can ensure that your camera operates safely and efficiently, protecting your property from unauthorized access. Always remember to maintain good security practices for the best protection.

 


 

Tips to Keep Your IP Camera Safe and Secure

In our increasingly connected world, IP cameras have become essential for home and business security. However, with their convenience comes the risk of unauthorized access. Here are some effective strategies to keep your IP camera safe and secure.

1. Change Default Credentials

One of the easiest ways to gain access to your IP camera is through the default username and password. Manufacturers set these defaults for ease of use, but they are well-known and easily exploited. An example is User: admin; Password: 12345, or some variation that is simple for first time ease of use.

Action Steps:


2. Update Firmware Regularly

Manufacturers periodically release firmware updates to patch vulnerabilities and improve security features. Failing to update your camera can leave it exposed to known security flaws.

Action Steps:

  • Check the manufacturer’s website or your camera’s app for firmware updates regularly.
  • Enable automatic updates if the option is available.

3. Secure Your Network

The security of your IP camera is only as strong as your network. A weak Wi-Fi password or unsecured network can allow for easy access.

Action Steps:

  • Use a strong, unique password for your Wi-Fi network.
  • Enable WPA3 encryption (or at least WPA2) to secure your network.
  • Consider creating a separate network for your IP cameras, isolating them from other devices.

4. Disable Unnecessary Features

Many IP cameras come with features like remote viewing and cloud storage, which can increase the risk of unauthorized access if not properly secured.

Action Steps:

  • Disable remote access features unless you absolutely need them.
  • If remote viewing is necessary, ensure it uses secure protocols (like HTTPS) and is protected by strong credentials.

5. Use a VPN

A Virtual Private Network (VPN) encrypts your internet connection, making it difficult for attackers to intercept data. This is especially useful if you need to access your camera remotely.

Action Steps:

  • Set up a VPN on your router or individual devices to secure your connection.
  • Ensure your VPN provider is reputable and offers robust encryption standards.

6. Monitor Camera Logs

Most IP cameras keep logs of access and activity. Monitoring these logs can help you spot any unauthorized attempts to access your camera.

Action Steps:

  • Regularly review access logs for any suspicious activity.
  • Set up alerts if your camera supports them to notify you of unauthorized access attempts
  • .

Conclusion

Keeping your IP camera safe requires a combination of strong security practices, regular maintenance, and monitoring. By following these strategies, you can significantly reduce the risk of unauthorized access and ensure that your surveillance system remains an effective tool for security. Remember, a proactive approach is key to safeguarding your privacy and peace of mind.

 


 

Thursday, 19 September 2024

Can someone track your cellphone/mobile number?

 
A large number of new websites are showing up in adverts and searches claiming to have the ability to find the location of someone by just entering a cellphone or mobile number. Some claim to be able to read and view chat software like WhatsApp and text messages or social media chats.
I'm not referring to pre-installed or trusted apps that can be used to track devices. Those types of software have access to the GPS system of the device and can actively report on where the phone is located within a certain margin of error. 
I am also excluding the official "Find my phone" apps that are installed by the manufacturer and is part of the operating system. To use these types of trackers you agree to the terms of use and then activate the GPS. 

Here is an example from one of the sites:



They claim to be able to find a large amount of data about you from various social media apps, texts and photos as well as your exact current location. All you need to do is sign up and pay a small fee.
Here is where the alarm bells should start ringing and the red flags should be raised.
 
It is impossible for any external software to be able to find this information on you from just your cellphone/mobile number. Not without having direct access to your device. The claims that they are making about what they can find and how fast they can do it are impossible as no normal person or company will be able to get this information without permission from the courts/authorities.
 
Imagine if anyone could just enter a number, pay a few dollars, and within seconds be able to find anyone they are looking for! 
 
The authorities/governments have been trying for years to convince the cellphone manufacturers to do this for them, but have always been denied as it seriously invades the privacy of regular citizens.
Not to say that the cellphone manufacturers have not helped in the past, but those are rare cases and usually involve a missing person/child who definitely needs help i.e. emergency situations.

Even your service provider, who has access to the cell tower logs, could only roughly pin point your general location within a large area. Basically they could do a search for which cell tower your device is currently connected to and then use the coverage map of the tower to show roughly in which general area you are. That is still not very accurate, and if you were in a large city, you could be in any building, among thousands of other people, in quite a large area. You would still be very difficult to find.
 
If you have a lot of your personal data online, such as an address linked to your phone number, or you have had some of your data leaked onto the internet in the past, someone might find it easier to track your location as your personal info is now in the public domain. It would be best to approach the companies who are holding that data and ask them to remove it. Changing your phone number might also be a good idea as it will break the link between your phone number and the online data and will make you much harder to find.

In conclusion, do not fall for these kind of scam websites. They are most likely trying to get hold of your credit card information as the site you are logging into could be hosted anywhere and by anyone. There will most likely be no way to hold the site liable for stealing from your credit card as there is no way to find them, or the site is listed in another country and cannot be tracked down to a physical location.
 A lot of people have missing loved ones and it is sad that there a people who will try to take advantage of a desperate person who might not be thinking things through before trying anything and everything to find someone.
 

 


 



The Great Inference Adventure: From Debugging Despair to Deployment Delight

Background, Be Gone: Running Inference with ONNX and U2Net Ever looked at an image and thought, “The background really ties this mess to...