(Continuation from yesterday)
If the company is charging smart-phones with parts (hardware), it can only be said to be "idiot".
I would never do such an idiot. I think that
"If I do, I will lock on the software. However general purpose applications are out of scope. The kernel is not a good choice, because the cost of remodeling will be huge, and the performance will be degraded."
"If it is, I will prepare the "farm" or "driver" which is close to hardware and difficult for reverse engineers. The most suspicious is the "communication driver".
Even if not me, an ordinary IT engineer will think so.
However, government officials in Japan, if any, sent out this "idiot" information, after that, they was pointed out by the company and the media, and they was embarrassed.
As a result, the low level of IT technology (common sense) of Japan's government (or the ruling party members) was opened, and they seemed to be "self-destructing".
-----
"How would I prepare?"
I thought a little about how to bring in spy-ware that can deceive an engineer like me.
Communications that can be hacked with my skill, are limited to protocols that have been approved by certification authorities (IETF etc.) and are becoming de facto worldwide.
If they are not limited to that type, for example,
"They break into a well-known server and push a back door there. In addition, they let the smart-phone side send ordinary user location information"
But this will be basically uncovered. It is enough to keep a log of all the huge packets and find out the strange packets.
If you think about it a bit more difficult,
"On smart-phones that are GPS synchronized (nanosecond level)"
"Invert and transfer only 1 bit of 1 million packets, disable error bit detection only at that moment, and generate a communication port,"
"Wait for one bit on a fully time synchronized server"
However, even with this method, if someone keep monitoring the communication packet of the smart-phone for a long time, they will definitely see it someday.
Or
"a mechanism that generates communication only when a smart-phone is present at a specific position only for a specific person"
It will becomes difficult to discover.
Or,
"Use near-field communication bluetooth etc. to generate communication only when approaching the target person"
is also possible.
Well, there are various hands.
Even a control system can intrude, so hacks on smart-phones are easy.
When I check it, it seems that some people think like me.
However, the article which has disclosed the evidence has not been found (yet).
(To be continued)