BeSafe: Is your phone a digital safe or a ticking time bomb?
And I'm back with BeSafe after a month! Based on the phrase "after a month," you probably already guessed that I've finally decided BeSafe will be a monthly series. In the last episode, we went over the basics of how to look after your data, such as emails, phone numbers, and passwords. Today, however, we're diving into the devices themselves.
Surprisingly, we won't start with computers or laptops, but with our smartphones. They are our daily companions, on which the vast majority of us now do much more than just making calls or texting our loved ones. We use them for de facto everything! And that's exactly why they deserve my attention and yours.
What do you think? Are you afraid of what you'll find out today? Don't be. Although you might find yourself in some of these mistakes, everything has a solution. It's always better to start dealing with things now than never. So sit back, get comfortable, and let's get into it!
A mobile phone and its security are tied to its price
You might be thinking: "What? Is he trying to tell me that an expensive phone is more secure?". The answer isn't entirely black and white, but in the vast majority of cases, it's: Yes. Let's explain why, and no, it's not just about paying extra for the brand (though it might look that way with some manufacturers).
When you buy a phone for a few thousand from a lesser-known manufacturer, you're buying the hardware, but not the service. The manufacturer of such a cheap device needs to sell millions of units to make a profit, and the subsequent software care—those crucial updates—costs them money and programmers' time. The result? Your cheap phone gets one, maybe two updates, and then the manufacturer "gives up on it".
At that moment, you're holding a device that has known holes in the system that hackers know about, but no one is patching anymore. With more expensive models, like the iPhone or the higher-end Pixel or Samsung series, you're paying precisely for that long-term support. You know that even in five years, you'll receive a data package that will re-lock your "digital home" against new threats.
In short: A cheap phone can end up being the most expensive investment if you lose your privacy or access to your banking due to a lack of security.
Of course, as you probably know from my work, I currently exclusively use Apple products and function within their ecosystem. It is, therefore, the platform I know best and where I can demonstrate stability and security in practice. It fascinates me, for example, that Apple can release a security patch even for the old iPhone 6 or Apple Watch models that technically shouldn't be eligible for support anymore. This proves to me that they care for their products long after they've been sold.
Try putting your hand on your heart and remembering: How many updates come to your phone? Do they arrive regularly every month like with Apple? Or once every six months? Or not at all? Suddenly that higher purchase price starts to make sense, doesn't it?
I don't want to come across as a non-critical "iSheep". Before I settled with Apple, I had phones from Xiaomi, Huawei, Sony, and even good old Nokia. I have to admit that some tried, but from the perspective of security and long-term certainty, my experience with Apple simply cannot be compared. The certainty that your "digital safe" in your pocket is constantly monitored by a team of professionals is key for me today.
But to be clear: this doesn't mean that Google Pixel or Samsung phones aren't sophisticated and secure. Of course they are, and with their flagships, they try to stay hot on Apple's heels. I just can't speak about it from direct personal experience, but rather from what I observe around me. I have people around me with Samsungs and Xiaomi phones and occasionally I hear that they are waiting in vain for an update... then I wonder if it's precisely because of the price and the manufacturer's approach to cheaper models.
Anyway, I'm interested in how you are doing! I've prepared a survey for you. I'd be very happy if you'd answer it; I will then evaluate the data anonymously and, in one of the next episodes, show you how we, the readers of BeSafe, are doing in terms of digital security.
Short-term savings vs. long-term hazard
I understand one thing. We live in a time when everything is getting more expensive, and not everyone can (or wants to) pull thirty thousand out of their pocket for a new phone. Saving on a purchase is a logical choice. But in the digital world, this coin has its flip side. If you save on a phone that stops receiving updates after a year, you aren't actually saving. You're risking your privacy, passwords, and ultimately, your money in your account.
Let's look at how different brands perform in "after-sales care". It's one of the most important parameters that you won't find in the brochure:
| Brand / Model | Support (Versions) | Patches | Reality |
|---|---|---|---|
| Apple iPhone | 5–7 years | Monthly | Top-tier care even for old models. |
| Google Pixel (8/9) | 7 years | Monthly | Exemplary support directly from Google. |
| Samsung (S / Z) | 4–7 years | Monthly | Premium care for flagship models. |
| Samsung (A series) | 2–4 years | Quarterly | Decent mid-range standard. |
| Xiaomi / Redmi | 1–3 years | Irregularly | Cheap models often without support. |
| Budget brands | 0–1 year | Rarely | High security risk. |
From reviews and real user experiences, a clear trend emerges: For cheap Chinese phones under 5,000 CZK, support is often at freezing point. The manufacturer churns out a model, sells it, and then stops caring.
Do you hear that? That's the moment when a five-thousand-crown saving can lead to a leak of your banking passwords just because the system had a hole that nobody fixed anymore. It's like buying a car without brakes just because it was cheaper. It might run, but it won't necessarily get you to your destination safely.
Price is not the only culprit in security
Perhaps the owners of flagships worth tens of thousands have breathed a sigh of relief, but I must prove you wrong. Price and brand are not the only factors determining your security. The biggest factor is, in fact, you.
I often observe a paradox around me: a person has the latest iPhone or a top-tier Samsung in their pocket, but a red icon for an available update has been glowing in the settings for six months. "I don't feel like it.", "I don't have time." or "I heard it drains the battery faster."—these are the most common excuses. But that is a huge mistake.
Updates are the most important part of phone care. Even if we sometimes don't like the new look of icons or a change in navigation, we must realize that what we see on the surface is just the tip of the iceberg. The most important things happen "under the hood". With every update, manufacturers patch security holes that could allow someone unauthorized to access your privacy.
Here, I'd like to appeal to all of you: Check your updates more often. Realize everything you have on your phone:
- Mobile banking: Access to your life savings.
- Payment cards: You have them in your digital wallet, you manage subscriptions from Netflix to iCloud through them.
- Privacy: Photos of your children, private messages, work emails.
Why do Apple and Google have a head start? (The Closed Circle)
- Waiting for the base: Manufacturers like Xiaomi or Motorola must wait until Google releases the clean Android or a security patch.
- Custom overlay: The manufacturer must take this code and graft their own graphical overlay onto it (e.g., MIUI/HyperOS). This is the first place where errors and delays occur.
- Operator layer: If you have a phone from a carrier, they must approve the update as well. That's the third brake in the line.
Your phone is the key to your life: What are you risking?
What exactly is at risk?
- Payment cards (Apple Pay / Google Pay): Most of us pay with our phones today. For your card in your digital wallet to be safe, the phone's system must be bulletproof. Old system = easier path for malicious code trying to misuse your payment data.
- Mobile banking: Do you have a banking app on your phone? Then you have access to all your savings there. Banks secure their apps excellently, but if the operating system of your phone itself is "leaky," the security chain breaks at its weakest link.
- Your private communication: iMessage, WhatsApp, emails, or SMS. They aren't just messages. They are confirmation codes for various services, sensitive work information, or personal photos. A leak of this data can lead to blackmail or identity theft.
- Password managers and auto-fill: Do you have passwords saved in your browser? If an attacker gets into an unupdated system, they can get to them as well.
The phone as your "ID card"
- Bank Identity and Citizen Portal: Today, we use our phones to log in for taxes, to view the land registry, or to communicate with social services. If an attacker gains access to your unupdated device, they hold the key to your digital identity.
- eDocuments (ID card, Driver's License, Passport): Digital IDs are great, they save space in our wallets, but they place extreme demands on phone security. A phone without current security patches is like having your ID card lying on a park bench.
- Data Boxes: Official government communication takes place directly on your mobile. Imagine someone signing a contract or filing an official appeal for you just because you ignored that "annoying" system update.
The last line of defense: Screen lock and biometrics
- Forget about gestures: Connecting dots (squares, L-shapes) is the weakest protection. Furthermore, smudges often remain on the display, showing exactly where your finger went. Use a strong PIN (at least 6 digits) or a password.
- Not all "face unlocks" are equal: Be careful here. Apple Face ID uses sophisticated biometric sensors that map your face in 3D. That is secure. But beware—on many cheaper phones, unlocking only works via a standard selfie camera. Such a system can often be fooled by a mere photo or video on another screen. If your phone doesn't have biometric sensors (similar to Apple's), you're better off staying with a fingerprint or a strong PIN.
- Fingerprint (Touch ID and others): A great and secure choice. It's fast and very difficult for an attacker to crack.
- Watch your surroundings: This is the most common mistake. Do you enter your PIN on the bus, in a cafe, or in a checkout line? Modern thieves often "shoulder surf" your code first and then steal your phone. With the code in hand, they have access to everything we wrote about above.
Conclusion and your feedback
Important Notice: I am not a cybersecurity or systems security expert. This article is written in my own words, based on my knowledge and experience with technology, the web, and the digital world. It serves as informative and educational content for readers and followers, not as an official guide or guarantee of security. The author bears no responsibility for any consequences resulting from the application of the recommendations provided. You may link to this article, but copying or using it otherwise without the author's permission is not allowed. The image used in the article was created as an illustration using ChatGPT.
