
Covering cameras with duct tape like Mark Zuckerberg or disabling smartphone cameras and microphones like Edward Snowden are simple yet effective security measures whose effectiveness has been confirmed.
1. Effective yet simple security measures
Covering cameras with duct tape like Mark Zuckerberg or disabling smartphone cameras and microphones like Edward Snowden are simple yet effective security measures whose effectiveness has been confirmed.

Disconnecting network cables or Wi-Fi
Most computers and mobile devices today are connected to the Internet (wired or wireless), which is also the reason for attacks against them. Therefore, for important tasks performed on computers, many people have the habit of disconnecting to prevent unauthorized access. After completing the tasks, data is copied to external storage, such as external hard drives, USB drives, and then deleted from the device to ensure security.

Disabling USB port connections
This security measure can often be observed in public internet cafes. According to an internet cafe owner, this is a necessary step to prevent customers from using USB drives containing viruses, which could potentially infect the entire system.

Covering cameras with duct tape
This is a method employed by Facebook CEO Mark Zuckerberg, which has been widely shared within the community recently to avoid being spied on through the camera. According to BI, FBI Director James Comey and former government contractor Edward Snowden have also taken similar precautions. In the comments section of the article, many readers also shared that they practice this habit out of concern that malicious actors might secretly activate the camera and spy on them.

Disabling smartphone cameras and microphones
Recently, on HBO, Edward Snowden discussed how he protects his smartphone from external surveillance. Specifically, he disconnects the camera and microphone, as well as disables Wi-Fi, 3G, and Bluetooth. “You may find this odd, but this is the way to truly own your smartphone. You can use a camera to take photos, use headphones to talk to someone, to avoid others from infiltrating your device,” Snowden explained.

Using typewriters
With the increasing prevalence of keylogging software and computer monitoring, many organizations have resorted to more primitive methods of information security, including the use of typewriters, out of concern that their written communications may be intercepted. In 2013, it was reported that Russian agents imported a large number of typewriters to dispatch sensitive documents. While this method offers security, storing the documents poses challenges, especially in the event of fires or the risk of falling into the wrong hands.
Source: vnexpress
