{"id":11668,"date":"2015-11-19T16:29:26","date_gmt":"2015-11-19T09:29:26","guid":{"rendered":"http:\/\/blog.flexispy.com\/?p=11668"},"modified":"2015-11-26T16:25:05","modified_gmt":"2015-11-26T09:25:05","slug":"the-4-biggest-myths-about-spy-phone-software","status":"publish","type":"post","link":"https:\/\/blog.flexispy.com\/ko\/the-4-biggest-myths-about-spy-phone-software\/","title":{"rendered":"The 4 Biggest <span id=\"bold\">Myths About Spy Phone Software<\/span>"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Spy phone software has been thrust into the media spotlight over the last few years, bringing awareness to the critical roles they play in grabbing information that someone would like to hide from you. And while once considered a mythical thing reserved only for the CIA, or FBI, <\/span><a href=\"https:\/\/medium.com\/android-news\/what-is-the-surprisingly-commercial-android-backdoor-depicted-in-mr-robot-bde7804cbac5#.fyybsgivl\" target=\"_blank\"><span style=\"font-weight: 400;\">multiple shows,<\/span><\/a><span style=\"font-weight: 400;\"> research papers, and news agencies have brought attention to the industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But as with\u00a0most\u00a0stories that gain attention, sometimes details\u00a0being reported are either slightly inaccurate, or just\u00a0blatantly untrue. To advocates in the <\/span><a href=\"http:\/\/www.spyphonereview.com\/\" target=\"_blank\"><span style=\"font-weight: 400;\">Monitoring community<\/span><\/a><span style=\"font-weight: 400;\">, it can be frustrating to read and hear about stories that not only are untrue, but are actually harmful, so it\u2019s important to understand what is myth vs reality.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the 4\u00a0biggest myths about spy phone software<\/span><\/p>\n<h2>Myth: You can install Spy Phone Software over the air<\/h2>\n<p><b>Reality: <\/b><span style=\"font-weight: 400;\">There is no spy phone software that can be installed magically through the air and onto someone elses phone. When installing any spy phone software, you have to accept permissions that pop up on the phone during activation, so you&#8217;ll need to have the phone physically in your hand. There are several scams out there though from companies claiming that you can install via bluetooth. This is simply not true.<\/span><\/p>\n<h2>Myth: Spy phone software can be installed on any iPhone, even one that isn&#8217;t jailbroken.<\/h2>\n<p><b>Reality:<\/b><span style=\"font-weight: 400;\"> Our team would love if this was true, but it&#8217;s just more misinformation\u00a0from phony spy apps who are trying to spread\u00a0this myth so that those less educated about spy software purchase the software. In reality the iPhone\u2014or any other iOS device\u2014must be jailbroken first before installing any type of software that is not directly available in the app store.<\/span><\/p>\n<h2>Myth: it&#8217;s really hard to\u00a0install spy phone software<\/h2>\n<p><b>Reality:<\/b><span style=\"font-weight: 400;\"> \u00a0You don&#8217;t have to be some coding master to use spy phone software correctly. On average it will take anyone less than 5-10 minutes to install and activate a spy app onto a phone. But just to make sure you know what you&#8217;re doing, we recommend that you install and activate onto your primary phone first, before trying to install it on the phone you actually want to monitor.<\/span><\/p>\n<h2>Myth: spy phone software is a trojan<\/h2>\n<p><b>Reality: <\/b><span style=\"font-weight: 400;\">While there&#8217;s a possibility of \u00a0some NSA-level spy app lurking out there, probably pre-installed on the world&#8217;s entire phone supply, \u00a0there is certainly not a <\/span><i><span style=\"font-weight: 400;\">consumer level <\/span><\/i><span style=\"font-weight: 400;\">spy app that could be classified as a trojan. That didn\u2019t stop a certain anti-virus companies from <\/span><a href=\"https:\/\/www.f-secure.com\/v-descs\/flexispy_a.shtml\"><span style=\"font-weight: 400;\">trying to label us<\/span><\/a><span style=\"font-weight: 400;\"> as one though, and you can read our response to the incident <\/span><a href=\"http:\/\/www.flexispy.com\/fsecure-fearmongering-about-mobile-trojans.htm\"><span style=\"font-weight: 400;\">here<\/span><\/a><\/p>\n<h2>Conclusion<\/h2>\n<p>Hopefully this article has helped to clear a few\u00a0spy phone software misconceptions that exist. The ones we wrote about in this post probably aren&#8217;t the only myths that exist though. If there&#8217;s a myth that you discovered then let us know in the comments section below, we&#8217;ll be happy to add it to our post!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spy phone software has been thrust into the media spotlight over the last few years, bringing awareness to the critical roles they play in grabbing information that someone would like to hide from you. And while once considered a mythical thing reserved only for the CIA, or FBI, multiple shows, research papers, and news agencies [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":12332,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132],"tags":[],"class_list":["post-11668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks"],"_links":{"self":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/11668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/comments?post=11668"}],"version-history":[{"count":14,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/11668\/revisions"}],"predecessor-version":[{"id":12462,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/11668\/revisions\/12462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/media\/12332"}],"wp:attachment":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/media?parent=11668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/categories?post=11668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/tags?post=11668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}