There's an awful lot more than that in it, on offer from far shadier organisations, of course.
Anon, cos.
A second Mobile Pwn2Own hacking competition, in which experts discover and exploit security flaws in handhelds for prizes, will take place at the PacSec 2013 conference in Japan in November. For many years, the original Pwn2Own contest has been held at the CanSecWest get-together in Vancouver every March. Like its older …
> So as a reward, they're given something they themselves have proven to be insecure
Quite, but then if I were inclined to enter then I'd probably appreciate a spare/new-and-interesting device for experimental purposes - plus the quality of advice on what to avoid* as a replacement for the old kit (or what to shield, if keeping it) would be unparalleled ;)
* sadly not on what to buy, as the closing paragraphs convey :/
Has anyone checked what the mobile Chrome does? Google has your bookmarks, your downloads, your history, thumbnails of pages you've visited, your calendar, your contacts, your search history, permission to take pictures, permission to record audio, a live stream of you typing into the URL bar, your location, and it even has an "optimization" that will route all HTTP traffic through Google. Most of this is enabled by the phone's factory configuration wizard.
For quite some time Nokia "feature phones" used to crash when they got strangely formed SMS or cell broadcasts. Now of course software quality is much better than it used to be in the 1990s, however GSM stacks running on the baseband chips are still that old.
Furthermore there have been attacks on the SIM cards which even work through SMS.