🪪 What is PII? ⚔️ Common Attacks 📋 App Permissions Explained ✅ What to Do Right Now

PII and SPII — What's the difference?

Two terms you need to know: PII (Personally Identifiable Information) and SPII (Sensitive PII). Both can be used against you — SPII just does more damage faster.

PII — Personally Identifiable Info

The basics about you

Any data that can be linked back to you as an individual. Alone it seems harmless — but combine a few pieces and someone can impersonate you, spam you, or sell your profile.

Your name Email address Phone number Home address Birthday IP address Photo with location data
SPII — Sensitive PII

The stuff that ruins lives

A step beyond PII. This data is directly tied to your financial security, health, legal status, or physical safety. A breach here can have consequences that last years.

Social Security Number Bank account numbers Health records Passport / ID scans Biometric data Precise GPS location Sexual orientation

🛡️ Why this matters for your phone

Pre-installed apps often request access to your location, contacts, microphone, and camera — all of which are PII or SPII collection points. When an app you never opened has your contacts and real-time location, you've handed over PII without knowing it. SlamDoor flags exactly which apps are doing this so you can shut the door.

Why protecting it is hard

The data economy is built on you not noticing. Apps collect data in the background — when you're not using them. They share it with "analytics partners" buried 12 pages deep in a Terms of Service nobody reads. Your data gets sold, aggregated, and combined with data from dozens of other sources to build a profile that knows your income bracket, health concerns, relationship status, and political views.

The answer isn't paranoia. It's knowing which apps are worth the tradeoff — and removing the ones that aren't. That's exactly what SlamDoor is for.

The five attacks that get most people

Hackers don't need to be geniuses. They reuse the same five playbooks, over and over, because they work. Here's what they are and how to spot them.

🎣
Phishing
Fake messages that trick you into handing over your login
Most Common

Phishing is when someone pretends to be a trusted source — your bank, Apple, Amazon, PayPal, even your boss — to trick you into clicking a link and entering your password. The link looks real. The page looks real. The only tell is the URL.

Real example You get a text: "Your PayPal account has been limited. Verify here: paypa1.com/verify". Notice the "1" instead of "l"? That's the whole trick. You log in, they capture your password, and your money is gone within minutes.
✓ Check the URL before clicking ✓ Go to the site directly — don't click links ✓ Enable 2FA on every account ✓ When in doubt, call the company
🦠
Malware & Spyware
Software installed on your device that watches everything you do
High Risk

Malware is any software designed to harm you. It hides in apps, email attachments, and sketchy downloads. On Android, it can come pre-installed by your carrier or manufacturer — which is exactly why SlamDoor flags those apps.

Spyware is a type of malware that silently records what you type, where you go, what you say, and who you call. It reports all of this back to whoever planted it — without making a sound.

Real example In 2022, Xiaomi's Mi Browser was caught sending browsing history — including searches done in "Incognito mode" — back to Xiaomi's servers. The data included what you searched for, every site visited, and your unique device ID.
✓ Only install apps from Google Play ✓ Remove unknown pre-installs (SlamDoor helps) ✓ Check which apps have background data access ✓ Keep Android updated
👤
Man-in-the-Middle (MitM)
Someone intercepts your internet traffic without you knowing
Medium Risk

When you connect to public Wi-Fi — at a café, airport, or hotel — someone on the same network can position themselves "in the middle" between you and the websites you visit. They can read your traffic, steal session cookies, and intercept passwords on sites that don't use HTTPS.

Real example You're at an airport and connect to "Free_Airport_WiFi". The network was actually set up by an attacker on a laptop nearby. Every page you visit goes through their machine first. They capture your email login details while you "check your flight."
✓ Use a VPN on public Wi-Fi ✓ Only use HTTPS sites (padlock in browser) ✓ Avoid banking on public networks ✓ Turn off auto-connect to public Wi-Fi
📱
SIM Swapping
Attackers steal your phone number to bypass two-factor authentication
Devastating

SIM swapping is when an attacker calls your mobile carrier, convinces them they're you (using PII they bought or scraped from breaches), and gets your phone number transferred to a SIM they control. Now they receive your texts — including every 2FA code you're sent. They log into your email, then your bank, then everything else.

Real example In 2021, a 19-year-old SIM-swapped dozens of victims and stole over $16 million in cryptocurrency by intercepting their 2FA codes. The carrier transferred the numbers after an attacker gave basic personal details available from data breaches.
✓ Add a PIN/passcode to your carrier account ✓ Use authenticator apps, not SMS 2FA ✓ Never share your phone number publicly ✓ Ask your carrier about port freeze options
🎭
Social Engineering
Manipulation that exploits trust, urgency, or fear
Growing Fast

Social engineering doesn't hack your system — it hacks you. It works by creating a situation where you feel urgent pressure to act without thinking. A "tech support" call warning your computer is infected. An "IRS agent" threatening arrest. A "prize notification" asking for shipping details. The goal is always the same: get you to hand over information or access before you stop to question it.

Real example The 2020 Twitter hack — where celebrities' accounts were hijacked to run a Bitcoin scam — started with a social engineering call. An attacker called Twitter employees, pretended to be IT support, and convinced them to reset credentials. No code was ever written. People were the vulnerability.
✓ Hang up and call back on official numbers ✓ Urgency is a red flag, not a reason to act ✓ No legitimate company asks for passwords ✓ Verify before you act

What those permission requests actually mean

When an app asks for a permission, it's asking for a key to part of your life. Here's what each permission actually lets an app do — and why some apps have no business asking for them.

Permission What it accesses Risk if abused
📍 Location
Your real-time position, home address (inferred), workplace, travel patterns HIGH
🎙️ Microphone
Can listen via your mic anytime the app is running in the background HIGH
📷 Camera
Can capture photos or video — some exploits do this silently HIGH
👥 Contacts
Your entire address book — names, phone numbers, emails, relationships HIGH
💬 SMS
All your text messages — including 2FA codes from your bank HIGH
📁 Storage
Read files on your device, including documents, photos, and downloads MEDIUM
📞 Phone
Your call history, device IMEI (a unique phone identifier) MEDIUM
📅 Calendar
Your schedule, appointments, meeting details, who you meet with MEDIUM
🔔 Notifications
Can read all notification content from every other app MEDIUM
🌐 Internet
Network access — nearly all apps need this, but it enables data exfiltration EXPECTED

🚩 Red flag: permissions that don't match the app's purpose

A flashlight app that wants your contacts. A weather app that wants your microphone. A game that wants SMS access. When a permission has no obvious connection to what the app does, that's a data grab — not a feature. On the scanner results, SlamDoor shows you which permissions each app holds so you can make the call.

How to audit permissions on Android

Go to Settings → Privacy → Permission Manager (exact path varies by phone). You'll see every permission group and which apps hold it. If an app has a permission you'd never have granted knowingly, revoke it — or remove the app entirely.

What to do right now

You don't need to become a security expert. You need to do ten things. Here they are, prioritized.

Do this now

🔐 Enable 2FA on every account

Email, bank, social media — all of it. Use an authenticator app (Google Authenticator, Authy) instead of SMS when possible. This single step stops most account takeovers.

→ Start with email and banking
Do this now

🔑 Use a password manager

Reusing passwords means one breach unlocks everything. A password manager creates and stores unique passwords for every site. You only remember one master password.

→ Bitwarden (free) or 1Password
Do this today

🔍 Check if you've been breached

Visit haveibeenpwned.com and enter your email addresses. If you show up in a breach, change those passwords immediately and review what data was exposed.

→ haveibeenpwned.com
Do this today

📱 Review your app permissions

Settings → Privacy → Permission Manager. Revoke location, microphone, and camera from any app you don't actively use. If an app breaks, you can re-grant.

→ Start with location access
This week

🗑️ Remove bloatware you don't use

Every app you don't use is an attack surface. Pre-installed apps run in the background and report home. SlamDoor tells you which ones to remove.

→ Scan your phone with SlamDoor
This week

🔒 Add a PIN to your carrier account

Call your carrier and set a SIM PIN or account passcode. This is your SIM swap defense. Without it, your phone number can be transferred with just your name and address.

→ Call carrier support to set it
This week

📥 Update your operating system

Security patches fix vulnerabilities attackers actively exploit. An unpatched Android is like a door with a known broken lock. Updates close those gaps.

→ Settings → System → Software Update
This week

🌐 Use HTTPS everywhere

Check that sites show a padlock in the address bar. Never enter a password on a site that shows "Not Secure." Install a browser extension like HTTPS Everywhere if needed.

→ Look for the padlock icon

Start with your phone

The fastest security win is removing the apps that shouldn't be there. SlamDoor shows you exactly what's on your phone and what it's doing — no tech knowledge required.

SlamDoor my phone →