You should consider SAR when purchasing phones
Which phone is the safest for your health? Phone. How do I choose the safest one? Scientists believe that tissues closest to the phone's body absorb more energy than those farther away, and there are ways that light can help
Cell phones can do a lot more than they did a few years ago. However, a significantly expanded range of opportunities also means the emergence of new risks.
As we now use our phones for other tasks (from communicating, social media, online shopping, banking and web browsing), we must all take reasonable precautions to protect our phones and information from malicious attacks.
How to make your smartphone safer to use
- Lock your phone
Make sure the screen lock is on to reduce the risk of getting your hands on your phone.
- Use encryption to protect important information
Check if your phone has a data encryption feature and make sure it is being used. If your phone is stolen, cybercriminals will not be able to access the personal information stored on your phone if that information is encrypted.
- Track application behavior on your phone
Make sure resources on the phone are accessed with your permission after prompted by the app. This is especially important for Android smartphones.
- Protect your phone and your data
Many users, who wouldn't even consider using a laptop, PC or Mac without antivirus software, forget that modern smartphones are powerful computers and are at the same risk. Make sure that an established anti-virus program is running on all devices and that the anti-virus databases are regularly updated.
- Be aware of the dangers of jailbreaking root access
While it is tempting to gain root privileges in order to gain access to specific applications and services, it can be a serious threat to security. Do not try to root or jailbreak your phone to keep your phone and data safe.
- If possible, turn off Bluetooth
If you are not using a Bluetooth connection, it is best to turn it off. In this way, you can make your phone less vulnerable and reduce battery consumption.
- When choosing an antivirus for your smartphone, make sure it has theft protection.
Some smartphone security products have a variety of anti-theft features that allow the owner to remotely access a lost or stolen smartphone so that it can be locked, located, and erased.
According to information on the American Cancer Society (ACS) website, there are very realistic fears that cell phones could increase the risk of brain tumors and other types of tumors of the head and neck, writes the BBC.
The specific absorption rate (SAR) of electromagnetic energy is used to measure the potential health risks from radiation.Image: pixabay.com
It is an indicator of the electromagnetic energy absorbed in the tissues of the human body when using a mobile device. This varies depending on the make and model of the phone. Manufacturers must state the maximum SAR value given off by their product.
The Federal Office for Radiation Protection of the Federal Republic of Germany (BfS) has created a database in which new and old smartphones are compared to determine which ones emit the most.
Here are the smartphones with the strongest radiation:
As you can see, Chinese brands like Xiaomi, OnePlus and Huawei, as well as Nokia's Lumia 630, took first places.
The iPhone 7 occupies 11th place, the iPhone 8 13th place and the iPhone 7 Plus 16th place.
Unfortunately there are no universal recommendations for the "safe" level of cell phone radiation, but in Germany, for example, there is a government agency called The Blue Angel, which sets environmental standards and has already established itself as a reliable guide for consumers.
Only mobile phones with a SAR of 0.60 watts per kg are classified as safe by this authority.
All of the phones from the list above have twice as much SAR, and the Xiaomi M1A1 model, with a display of 1.75 watts / kg, tops the list.
And these are smartphones with the least amount of radiation:
As you can see, the least amount of radiation comes from smartphones like the Sony Experia M5 (0.14), Samsung Galaxy Note 8 (0.17) and S6 Edge + (0.22), as well as the Google Pixel XL (0.25) Samsung Galaxy S8 (0.26) and S7 edge (0.26).
To check your phone's radiation level, see the instructions that came with it, or visit the manufacturer's website or the FCC website.
How do I avoid exposure to radiation?
Image: By Ordercrazy (photo) (own work) [CC0], via Wikimedia Commons The strongest radio signal is on the transmitting antenna, which is hidden in the body of modern smartphones. In this case, the waves lose energy and become weaker as they move away from the phone.
Most users hold the cell phone to their ear when they talk, but the closer the antenna is to the head, the higher the expected exposure to radiated energy, according to ACS.
Scientists believe that tissues closest to the phone's body absorb more energy than those further away, and there are ways to minimize harmful effects:
1. Reduce the amount of time you spend on the phone.
2. Use your phone's speakers or headset to keep your phone away from your head.
3. Position yourself as close as possible to the cell tower: Cell phones are set up to use as little energy as possible in order to get a good signal. The further you are from the mast (or in a building or in a location with poor reception), the more power your phone will need to get a good signal.
4. Choose devices with a low SAR.
All cell phones support voice and text communication. And nowadays most devices do a lot more. Cell phones have become an essential part of everyday life largely due to their portability, versatility, and relatively low cost. The same properties make them valuable to human rights defenders who frequently use smartphones to exchange sensitive data and store sensitive information, as was previously the case on secure computers.
Our guide is primarily intended for smartphones and devices Android and iOS with mobile communication functions, with the option of voice and text communication, often with access to the Internet. The list of smartphone functions is constantly growing: cameras, digital storage, motion sensors, geosteering receivers (GPS), WiFi, easy access to a diverse collection of applications. Much of this manual can also be applied to other mobile devices, such as: functional phones (normal old fashioned mobile devices) and tablets. The latter are often large smartphones with increased performance, although they do not support mobile functions.
- Critical data is becoming more and more portable - how to deal with the risks
- Why mobile voice and text communications are particularly vulnerable to surveillance
- What steps should you take to improve the security of your smartphone when transferring and storing data, taking photos, visiting websites, and more?
- How to improve your chances of staying anonymous (if necessary)
Smartphones are one of the most powerful technologies available to most people. These devices are crammed with various sensors, almost always at hand, and usually connected to one network or another. All in all, there are most of the security threats we normally associate with computers, as well as a number of additional problems that arise from portability, versatility, insecure network architecture, location tracking, image capture, and so on.
Most smartphones run on two operating systems: Google Android and Apple iOS... all kinds of companies sell Android devices. Your software "filling" is often changed by developers and service providers. They hope and sometimes demand that device owners work you Cellular networks (and of course chargeable). The iOS operating system only works on Apple devices. This makes it much more difficult to start applications that have not yet been run approved Apple.
One of the main factors affecting the security of an Android smartphone is regular operating system updates. Some cheap models do not have access to updates, so serious security holes cannot be fixed there. Doing so can leave you vulnerable to malicious code and a wide variety of attacks.
Branded and blocked smartphones
Smartphones are often sold locked. This means that the device can only work in the network of a specific telecommunications operator. (Only with the SIM card of this operator). The operator often changes the operating system and installs additional applications on the locked phone. In addition, the operator can deactivate some functions. The result is applications whose access to data, including your contacts and stored information, cannot be removed or denied.
Therefore, it is safer to buy an ordinary, unlocked smartphone without being tied to a telecommunications operator. Unfortunately, these smartphones are usually more expensive.
Basic security settings
A smartphone has many settings that you can use to control the security of the device. It is important to know these attitudes. For more information on some Android settings and applications, see this guide:
Install, review, and update applications
The easiest (and usually safest) way to install the app on your smartphone is to use Google Play for Android or Appstore for iOS. Sign in to your account on the device - and you'll be able to download and install applications.
Android apps are available online in many places, but our "standard" advice is not to install apps from everywhere. Some of them contain malicious code. For more information on malware, see our Guide to Protecting Your Devices from Viruses and Phishing. Only install apps from trusted sources. Remember, trusted people can accidentally spread malicious code without knowing it. Apps on Google Play and in the App Store are subject to review by Google and Apple, respectively. This provides some protection against obviously malicious applications.
There is also a solution for advanced Android users - or for those who don't want or can't use Google Play. The F-droid , an alternative selection of programs in which only FOSS Applications. If you need access to F-Droid, you can install the appropriate application from a trusted sourceand then use it to install other applications. You can also install applications directly from files .apk(Android packages)when you activate the function installation of unknown applications... yes it is risky, but if you have no other option to install the application you want, you can ask someone you trust .apkFile on the memory card.
Even "official" apps sometimes behave badly. On Android devices, every application requests permission to perform certain actions. You should pay close attention to the permissions the programs require. If this is illogical, clarify the reasons and consider not giving permission and removing the request. If you want to install a newsreader application and have it send your contacts to third parties over the network, there is cause for concern. (Some developers collect contact lists for sale or personal use for marketing purposes.)
Try to keep your apps up to date and uninstall the apps you are not using. A developer can sell their creation to other people who modify the already installed application and add malicious code.
The cell phones that we take with us wherever we go often contain important information. Call history, browser history, text and voice messages, address books, calendars, photos and other useful things can lead to a number of problems if the device they were saved on is lost or stolen. You need to know where important information is on your mobile phone and online data that can be accessed automatically. This data can not only pose a threat to the owner of the device, but also to anyone who ends up in the address book, in incoming messages or in the photo album.
So you've considered the potential risks and familiarized yourself with the security and privacy features of your device. It's time to take protective measures.
We store information on a smartphone
Modern smartphones have a lot of storage space. It can be easy for someone with physical access to the device to get this information. (Of course, this depends on the device itself).
Encrypt the device and the data on it
On modern iOS devices, strong encryption is enabled by default (of course you need to set a strong password). Android also supports device encryption, which you can usually turn on. Remember to back up your smartphone data before encrypting the entire device. This is useful if problems arise during the encryption process.
With Android you can also encrypt data on memory cards (ex. microSD) when you use them.
Turning on the encrypted phone and entering the password will give you access to read and modify data on the device. Anyone with physical access to the phone when it is turned on and unlocked can access your data. For more security - for example before crossing a border or going through security precautions at an airport - it is best to turn off the device completely.
Of course there are not only advantages but also disadvantages. For example, if you think you need to make a call urgently, the best thing to do is to leave the phone on and just lock the screen.
If you can't fully encrypt your device (or need additional security for individual files), install an encryption app. Some applications encrypt their own data, e.g. B. You can encrypt third-party files with OpenKeychain. Using this app together with the program K-9 mail you can send and receive encrypted emails. (There are no analogues for this on iOS). Apps like these can help protect valuable information. However, you should consider encrypting your device.
It makes sense to minimize the amount of valuable data that you store on your device, especially if it is not encrypted. Some phones have a feature that does not allow you to save the history of calls and SMS messages. You can make it a habit to delete important data from your call and message history.
Secure storage of passwords
Passwords can be saved in a single encrypted file when you install the KeePassDroid FOSS application. This application is the only one, but very reliable master password used to protect all other Passwords. These, in turn, can be very long and unique for all accounts, and you don't need to remember them. KeePassDroid has a built-in password generator that is helpful when creating new accounts.
If you are using KeePassXC or KeePassX on your computer as described in the tutorial on creating and saving strong passwords, you can copy your base (file) .kdbx) on your mobile device.
There is a similar app for iOS called MiniKeePass.
The first step in protecting information on a mobile phone is to restrict access to the device. You should always leave it on, except in situations where there are particular risks. This applies to both SIM cards and memory cards. Even if you are concerned about viruses or advanced surveillance, it may be safer not to leave your device unattended but to remove the battery and keep your smartphone with you.
So activate the encryption and keep your smartphone with you. What else can you do to physically secure your mobile device and mitigate damage if it is lost or stolen?
Always use a reliable screen lock code and do not give it to anyone. If you have a simple phone with a default code, change the code.
You should not keep important information, including phone numbers, on the SIM card as it cannot be encrypted there.
Back up important phone data regularly. Save them to a computer or external media. Keep your backups in a safe place as described in the chapter about protect important files on your computer ... Having a backup makes it easier for you to remember what information was on the phone and to do a factory reset if necessary.
Phone numbers are often tied to important accounts. An attacker might need your phone to gain access to these accounts or to impersonate you. Some mobile operators allow customers to protect their account with a PIN or password so that no one else can make changes to their account or steal their phone number. Use it if available.
Concerned About Malicious Code? It may be useful to have a small sticker temporarily covering the phone's camera.
About loss and theft
Mobile devices have a 15-digit International Mobile Equipment Identity (IMEI). You can use this code to identify the device on the network. Changing the SIM card does not change the IMEI. The code is often written under a removable battery pack. Most phones display IMEI in the settings and / or on request * # 06 #. Make a note of the IMEI. It can help you prove that you really are the owner of the stolen phone.
Think about the pros and cons of registering your phone with a carrier. When reporting a missing phone, your carrier usually has the option to turn the phone off. However, registering the device will still associate your identity with your phone.
Most Android phones and iPhones have a "Find My Phone" feature built in. You can track or deactivate the device in the event of theft. There are independent software developments for the same purpose. Tools like this involve a tradeoff. However, if you trust the owner of the service and its programs, you can try this option.
What to do if you need to transfer the device to someone else?
Whenever you throw away, give, or sell an unwanted phone to someone, make sure it doesn't contain information that is normally stored on a SIM card or memory card.This note is also relevant if the device has not been switched on for a long time or does not work at all. You can remove a SIM card by physically destroying it. Remove the memory card from the device and either destroy it or keep it in a safe place. The best way to protect data on your phone is to make sure it is encrypted and then do a factory reset.
Only use stores and repair shops that you trust. This reduces the vulnerability of your data when buying a used device or bringing your device in for repair. If you think someone has the resources, access, or motivation to track you down and install malicious code to do that (before buying your phone), then randomly pick one of the authorized dealerships.
When you send your phone in for repair, remove the SIM card and memory card.
Cell phones and cellular networks are even less secure than generally assumed. To send and receive voice and text messages, your phone is always in contact with the nearest one cell towers... This way, the network operator knows and records the location of the phone when it is switched on.
Interception of calls and text messages
Cellular networks are usually privately owned by commercial companies. Sometimes the entire infrastructure of a cellular network belongs to the network operator itself. Sometimes an operator resells a cellular connection that it has rented from another company. SMS text messages are not encrypted. Voice communication is not encrypted or is weakly encrypted. Both types of communication are not protected from control within the network itself. As a result, both your carrier and the cell tower owner have unrestricted access to your calls, text messages, and location data. In many cases, the government is given this access even if it does not own the infrastructure itself.
Many countries have laws and regulations that require telecommunications operators to record and store SMS messages from customers. However, most operators do this in the interests of their business tasks, in order to report and resolve possible conflicts. Similar rules for voice communication apply in some countries.
In addition, the operating system installed on a cell phone may originally have been developed or modified for a particular telecommunications operator. Accordingly, the operating system itself can contain hidden functions that make monitoring even more pervasive. This applies to both simple cell phones and smartphones.
A third party can sometimes also intercept voice and text communication. For example, an attacker could use an inexpensive device called iMSI catcher... If such a device is in the reception range of a cell phone, it can "catch" a real cell tower. (Sometimes they are called "IMSI catchers" stingrays - the name known to experts by which these devices are positioned in the market for the needs of law enforcement agencies). In some cases, third parties were even able to access cellular network resources from across the world. You have exploited vulnerabilities in alarm system 7(Signaling system number 7, SS7), a set of protocols for the international exchange of voice and SMS messages.
Even if you connect to the Internet using WiFi rather than a mobile phone, operating systems on smartphones and tablets encourage users to share their personal data on social networks and cloud storage. People are encouraged to actively use Global Geosteering (GPS) and other similar features. Lots of Android and iOS aficionados like it, and personal data has a better chance of "getting" on the network.
Do you want to protect your most important messages in transit? First, ask yourself a few questions:
- With whom, when and how often do you communicate?
- Who else might be interested in information that you communicate with this person?
- How sure are you that the person you are talking to is who they say they are?
- What is the content of your calls and messages?
- Who else might be interested in this content?
- Where are you from, where is your interlocutor?
If the answers to these questions raise safety concerns, consider how you can minimize the risks involved. To do this, you may need to help the interlocutor develop a new technology or program. In some situations, it is probably best to dispose of the cell phone as a means of communication.
Protecting the content of calls and messages can be challenging. It's even harder to remain anonymous when you're using a cell phone. In particular, when you make a call or send a text message, it is rarely possible to hide the fact that you are communicating with a specific person. You can use a secure messenger with an Internet connection over a cellular network or Wi-Fi. However, how can you guarantee success? Most of the time you can choose at most: which one Third parties have access to information and hope that this party is not working closely with those whom you want to protect your communications from.
To increase anonymity, people sometimes prefer disposable phones and short-term accounts. It works in some situations, but getting things right is not easy. The easiest choice for either side of the process is to buy prepaid phones, use them for voice calls and text messages for a very short time, and then destroy them. However, the data cannot be encrypted. The effectiveness of this method depends on a fairly long list of conditions. Here are some:
- Both parties buy phones and SIM cards with cash.
- If they do, no one will persecute them. real Telephones.
- You activate SIM cards without presenting any documents.
- They remove batteries from phones when they are not in use.
- You can exchange phone numbers without attracting too much attention.
- They use their phones in places where they don't normally spend time.
- When they go to places where they normally spend time, don't take their phones with them.
- Speech recognition technologies meet our expectations.
If all of the above conditions are met for a prepaid smartphone, you can try to hide the connection between the two parties by making encrypted calls. However, in order to really do this effectively, even more care and attention is required, also because smartphones and secure communication apps require account registration. There is little point in using an "undetectable" phone to access services that are already tied to your identity. You can create anonymous e-mail accounts and "one-time" accounts in other services. However, this takes time and focus. Both parties need to understand what IP addresses are, browser fingerprints, how to use the Tor browser or Tails to name a few. You have to spend extra time and money on randomly selected internet cafes without using real phones.
The phone can be configured to store or transmit data received by a microphone, camera or GPS receiver - and the owner is unaware of it (applies to a simple mobile phone and smartphone). Most of these attacks are malware-related, but it cannot be ruled out that telecommunications operators may be involved in similar monitoring of devices connected to their networks. Some phones can even be turned on remotely and tricked into spying on their owners even though they appear to be turned off.
If you don't trust the person, you're not giving them access to your phone. (Violating this rule is a common cause of malware getting onto our devices.)
Please Note: If you use a mobile phone in public or in a location that you believe is being monitored, you are vulnerable to traditional wiretapping. In addition, the risk of phone theft increases.
Configure those you communicate with on important topics and use the same programs and techniques that you use yourself.
Organize a private, face-to-face meeting? Disconnect the phone, remove the battery. Not to reveal a place Meetings, it is best to do this before you go to the meeting. If you can't remove the battery, just leave your phone in a safe place.
Signal's user ID (for simplicity) is a cell phone number. Unfortunately, this means you can't use Signal without a valid cell phone number, even if you prefer WiFi. If you want to contact someone through Signal, you'll need to give that person your phone number. For example, those for whom this is a problem may pay attention to other messengers with a "good reputation", e.g. wire (Android, iOS).
Answers to the following questions will help you choose a mobile messenger:
- What do digital security experts say about him?
- Is it free software? Open source?
- Does it support end-to-end encryption for communication between two users?
- Does it support end-to-end encryption in group text chat?
- Does it support end-to-end encryption for group voice communication?
- Does end-to-end encryption protect files in transit?
- Can messages be configured to self-destruct after being read?
- Will the program work with a slow internet connection?
- Who is the application developer, should you trust them?
- Who owns the server, what is the policy for storing calls and messages?
- Can you use one account on multiple devices?
- Are all common operating systems supported?
- Can I use my email address and username to register instead of a phone number (which separates your account from your real identity)?
- Can you use Messenger without giving it access to contacts on the device?
- Can I use it on a mobile device but not a phone?
- Can you (or someone you trust) run and communicate through your own server?
Sending and receiving email on a smartphone
Do you want to read important emails on your mobile device? Make sure encryption is enabled as described in the Android Security Basics. (Encryption is enabled by default in newer iPhones. It's just important to choose a strong password.) This will not protect your emails right through to the recipient, but will prevent anyone from trying to read them if a mobile device is lost / stolen . You may find instructions on how to keep your communications private.
This guide specifically addresses GPG -E-mail encryption on Windows, Mac and Linux computers. It is also possible to send and receive encrypted emails on Android devices, but not without difficulty. (There is currently no free GPG encryption for iOS.)
Most security professionals do not recommend saving yours secret encryption key in a location other than your primary work computer. (Also, do not carry the key with you). However, you need this key to read encrypted messages on your mobile device. Android devices are more secure today than they used to be, and your private key is protected by a strong password. Well, if you really necessary In order to send and receive such important data on an Android device, and the transition to a secure messenger does not suit you, you can install GPG on it.
For this you need:
- For example, install and configure GPG and a key management application OpenKeychain .
- Copy your private key to the device.
- Install and configure an email application that will work with OpenKeychain, e.g. K-9 mail .
Cell phones are multifunctional devices, small computers with their own operating systems, and downloadable applications. Cell phones offer a variety of services. Much of what you do on your computer you can do on your smartphone today. And of course there are a lot of things you can do on your smartphone but not on your computer.
The simplest cell phones can't connect to the internet, but these are rarely seen these days. If you use a browser on your Android device to get to restricted websites, consider using a virtual private network (VPN) or the app Orbot (Android versions of Tor Browser).
VPN on Android device
VPN creates an encrypted tunnel from your device to a VPN server somewhere on the internet. VPN protects outbound and inbound traffic. This is especially important when traffic is routed through an insecure local or national network. However, since all traffic goes through the VPN provider, it can display anything that is no longer available for viewing over the local network or internet access. It's important to choose a VPN service that you trust and use HTTPS when transferring valuable data.
VPNs are illegal or restricted in some countries. Find out about the situation in the country where you plan to use the VPN. Remember, a VPN doesn't hide the fact that you are using a VPN.
To use a VPN, you need to install a client application and create an account with a VPN provider. Promotion team offers a free open source VPN client for Android called Bitmask and supports the free VPN service Riseup Black. (If you already have a Riseup Red account and know how to set up a VPN manually, you can use the app OpenVPN for Android (Play Store, F-Droid) with your username and password Riseup Red... (Application OpenVPN for Android free and open source).
Tor on an Android device
To access websites anonymously, you can use some Android apps: Orbot and Orfox ... Orbot forwards internet traffic over the anonymous Tor network. Orfox is a mobile version of Firefox that uses Orbot and provides extra protection for your privacy. Together, these two applications allow you to bypass online filters and visit websites anonymously, just like Tor Browser for Windows, Mac and Linux.
For more information on anonymity and circumventing censorship, see the appropriate guide.
Photo and recording
Smartphones allow you to take photos, record sound, and record videos. These are all powerful tools for documenting events and disseminating information about them. The privacy and security of those who appear in front of the camera and in the recording must be respected. For example, if you recorded an important event and then the phone fell into the wrong hands, it could cause problems for both you and the heroes of your report. Some tips for dealing with these risks:
- Think about how you can securely and quickly upload recorded files to the network and delete them from your device.
- Use tools to blur people's faces that appear in your photos and videos, and to distort the voices of the people you capture.
- Find out which programs and settings to remove metadata in media files. Examples of such metadata are the GPS coordinates of the locations where the photos were taken, the parameters of the camera that was used to take the photos.
The Guardian project created and managed a free, open source application called ObscuraCam that works with photos and videos: blurs faces and removes metadata.
if you necessary Save faces, voices and metadata. Then it is particularly important that your device is encrypted. Files that you copy from your device to another location for storage or transfer must also be encrypted. Driven by this idea, programmer Guardian project developed the Proof Mode application, the Antipode ObscuraCam. Proof mode "pulls" as much metadata as possible from the material, which can help determine the authenticity of the image or video. This metadata is stored separately from the associated images and videos. Only transmit them through secure channels.
- Only connect your phone to your computer if you are sure that there is no malicious code on your computer. For more information, see our guide to protecting your computer from viruses and phishing.
- As with a computer, be careful when connecting to a Wi-Fi network without a password.
- Turn off Wi-Fi, Bluetooth, and Near Field Communication (NFC) when you are not using these features. Enable them only when necessary and only to connect to trusted networks and devices. If possible, use a cable for data transfer. by The Intercept
The smartphone is next to us almost every minute. This versatile device constantly sends and receives signals as it uses high frequency electromagnetic fields to transmit data over the cellular network.
Bild journalists carried out a study and found out when radiation is dangerous for humans and which mobile devices have the highest and lowest levels of radiation.
In 2016, American researchers discovered a link between radiation from cell phones and the occurrence of a disease as dangerous as cancer. During the study, rats were exposed to electromagnetic waves for several years, which led to the development of brain and heart tumors.
What is SAR
The Federal Office for Radiation Protection has been investigating radiation from cell phones and smartphones since 2002. The so-called SAR value (Electromagnetic Absorption Rate) is expressed in watts per kilogram (W / kg).
When is radiation dangerous?
A device with an SAR of 0.6 W / kg is considered harmless according to the Federal Office for Radiation Protection. The World Health Organization considers a mobile device dangerous if the SAR value exceeds 2.
What radiation does the iPhone have?
Apple cell phones: The iPhone 7 (1.48 W / kg) occupies 10th place in the ranking. The brothers iPhone 8 (1.32 W / kg) and iPhone 7 Plus (1.24 W / kg) are less harmful. Apple devices were not included in the rating of smartphones with the lowest radiation.
How can you protect yourself?
Use a headset or speakerphone. Do not hold your smartphone to your ear.
Stop updating the background data to prevent your device from working unnecessarily at night.
Use WiFi whenever possible.
These smartphones have the highest SAR values
5th place: Huawei P9 Plus with 1.48 W / kg
4th Place: Nokia Lumia 630 with 1.51 W / kg
3rd place: Huawei Mate 9 with 1.64 W / kg
2nd place: OnePlus 5T with 1.68 W / kg
1st place: Xiaomi Mi A1 with 1.75 W / kg
These smartphones have the lowest SAR values
The vast majority of people have a smartphone at a distance for days.
At work it is in our pocket or next to it on the table, on the way home in transport it is in our hand and goes to the bedside table before going to bed. Because of his constant proximity to us, many people have a perfectly reasonable question: Is there a long-term health risk?
Despite the fact that no serious research has been carried out on the long-term effect of a phone's radio emission on the human body, there are still smartphones that emit the maximum amount of ultrashort waves when pressed against the ear.
It is important to add that there is no safe standard for cell phone exposure. At the same time, the certification of the German company for environmental friendliness "Der Blaue Engel" is only issued for smartphones with a specific absorption coefficient below 0.60 W / kg.
Hence, we list smartphone models that have doubled that number or more. The SAR is shown next to the phone model when you hold the phone to your ear.
At the end, let's start with the most powerful smartphones.
Damage to cell phones
1. OnePlus 5T - 1.68 W / kg
2. Huawei Mate 9 - 1.64 W / kg
3. Nokia Lumia 630 - 1.51 W / kg
4. Huawei P9 Plus - 1.48 W / kg
5. Huawei GX8 - 1.44 W / kg
6. Huawei P9 - 1.43 W / kg
7. Huawei Nova Plus - 1.41 W / kg
8. OnePlus 5 - 1.39 W / kg
9. Huawei P9 Lite - 1.38 W / kg
10. iPhone 7 - 1.38 W / kg
11. Sony Xperia XZ1 Compact - 1.36 W / kg
12. iPhone 8 - 1.32 W / kg
13.ZTE AXON 7 mini - 1.29 W / kg
14. BlackBerry DTEK60 - 1.28 W / kg
15. iPhone 7 Plus - 1.24 W / kg
Now let's share with you some more facts about the dangers of gadgets.
1. Many people think what is the harm of a cell phone? After all, the manufacturers claim that the radio emission is so low that it cannot harm human health.
In reality this is not the case. Hygiene checks have been carried out repeatedly at the state level, which scientifically confirmed that modern cell phones are not safe and can harm the human heart, brain and reproductive system around the clock, as damage is caused not just during a conversation but at any time. when the phone is currently switched on.
- Why does the Quora app change all the time
- What remains important for an interview
- Theists see everything as religion
- What are the practical uses of LDR
- Where's St. Louis
- Which artist sang the song My Generation?
- What are Blockchain Ethereum Smart Contracts
- Are INTJ INTPs emotionless and cold people
- Are there any good guidelines for web design?
- What do you hear to fall asleep
- Informatik How is information deleted
- What are the main requirements of the GDPR
- Is VASER Liposuction expensive
- Does Steven Moffat know the doctor's name
- How does Buzvil work
- What inspired you to go into the movie?
- Who should pay to raise children
- How do you keep it simple
- Is YouTube marketing useful or FB marketing
- Why are luxury items so expensive
- What drives you to be successful every day
- Are real clone iPhones good or bad
- How do I integrate x lnx
- What is magnet and toroid