Can you really trust your cell phone?

The mini-computer you call your personal cell phone is one of the most insecure devices ever invented. Manufacturers, cellular providers, and third-party applications all record everything from the environmental conditions, modes of travel, and in some cases, record actual conversations. AI (Artificial Intelligence) can discern individuals from other technological devices.
I do want to admit that I do carry an advanced bugging device in my pocket. Mine is an older generation that has a removable battery. Apple and Google have implemented artificial intelligence gathering, making these devices the most heavily monitored computers in the world.

I highlighted one, of the existing problems in the backend of the cellular network, in a blog entry on this website. “SS7 hack allows anyone to listen to your cell phone calls and more. 
There are other carrier considerations, such as political propaganda. One example is highlighting bounty hunters selling geolocation data for ten times the rate that contractors in the military-industrial complex pay. At fault of all of this is the misconception of privacy and confusion when it becomes personal security.
Companies that manufacture the units often build backdoor access for nation-state security access. Leaving the holes to be penetrated by a curious 13-year-old, organized crime, and of course, the nation that represents its builder. There is a subtle irony that the global spy game between China, Russia, and the United States has left the former Soviet nation geotechnically dependent on its largest competitors.
Those that offer cellular service are amid change, and the world is rolling out 5G, which will alter and challenge the systems providing service. It has been my longstanding position that wireless communication should be at no cost. It has already absorbed some of the poorest nations on earth. That service, in some cases, is used in lieu of monitoring the actions of the population.
Social media and games have developed purposeful technical addictive qualities, making the devices irresistible to generations to come. While innovation deserves applause, there remain questions about national and personal security that need addressing. Most don’t consider the global implications of cellular use.
There have been many instances of people claiming that the phone listens to them. Major media published several reports and stories falsely denying the claims. In my unofficial polling process, I have discovered that Facebook messenger is behind many of the complaints.
In Computer technology, there is a term to describe trickery in gaining access to a device. The Greek Trojan Horse, or simply a Trojan program or app (application), refers to expecting one thing and receiving something dramatically different. For example, giving android users a flashlight button in exchange for the users’ contacts or text messages. Apple has had several types of trojans as well, along with fake Amber alerts and other mishaps.
The best advice I can give is if you have something important to say, or if you find yourself in a heated argument, have the sense to put the cell phone out of auditory range. Those that take cell phones into boardrooms and bedrooms are foolish at best.

“Two things are infinite: the universe and human stupidity, and I’m not sure about the universe.”
—Albert Einstein