Unbanked In A Connected World

Financial exclusion remains high in many parts of the world. In several countries, more than two out of three adults are unbanked, yet the majority own a mobile phone. This contrast between connectivity and financial access highlights both the persistent gaps in global inclusion and the massive opportunity to close them.

Created in partnership with Plasma, this graphic, via Visual Capitalist’s Jenna Ross, shows how ownership of financial accounts and mobile phones compares across countries. It’s part of our Money 2.0 series, where we highlight how finance is evolving into its next era.

The Unbanked Gap

In low- and middle-income economies, 84% of adults own a mobile phone, while 75% of people have financial accounts. This gap is much wider in some countries, especially in Africa and the Middle East.

For the most unbanked countries worldwide, here are the percentages of adults who own a financial account and those who own a mobile phone.

Keep reading

How the Military Exposed the Tools That Let Authorities Break Into Phones

Immigration and Customs Enforcement (ICE) really doesn’t want the public to know what it’s doing with Cellebrite devices, a company that helps law enforcement break into a locked phone. When it announced an $11 million contract with Cellebrite last month, ICE completely redacted the justification for the purchase.

The U.S. Marine Corps has now done the opposite. It published a justification to a public contracting platform, apparently by mistake, for a no-bid contract to continue putting Cellebrite’s UFED/InsEYEts system in the hands of military police. The document is marked “controlled unclassified information” with clear instructions not to distribute it publicly. UFED/InsEYEts “includes capabilities exclusive to Cellebrite and not available from any other company or vendor,” the document claims, before going on to list specific capabilities for breaking into specific devices.

Reason is posting the document below, with phone numbers redacted.

Keep reading

Google’s Android Lockdown: Are You Really In Control Of Your Phone?

Android’s new rule requires all app developers to submit personal information to Google, even for apps outside the Play Store. Critics argue this threatens user freedom and ignores solutions…

Android, Google’s mobile operating system, announced on August 25 that it will be requiring all app developers to verify their identity with the organization before their apps can run on “certified android devices.”

While this might sound like a common-sense policy by Google, this new standard is not just going to be applied to apps downloaded from Google Play store, but all apps, even those “side-loaded” — installed directly into devices by side-stepping the Google Play store. Apps of the sort can be found online in Github repositories or on project websites and installed on Android devices directly by downloading the installation files (known as APKs). 

What this means is that, if there is an application that Google does not like, be it because it does not conform to its policies, politics or economic incentives, they can simply keep you from running that application on your own device. They are locking down Android devices from running applications not with their purview. The ask? All developers, whether submitting their apps through the Play store or not, need to give their personal information to Google. 

The decision begs the question, if you can not run whatever app you want on your device without the permission of Google, then is it really your device? How would you respond if Windows decided you could only install programs from the Microsoft app store?

The move has of course made news in tech and cybersecurity media and caused quite a stir as it has profound consequences for the free and open web. For years, Android has been touted as an open source operating system, and through this strategy has gained massive distribution throughout the world with users in developing countries where Apple’s “walled garden” model and luxury devices are not affordable.

This new policy will tighten up controls over applications and its developers, and threatens the freedom to run whatever software you like on your own device in a very subversive and legalistic way. Because of Google’s influence over the Android variety of phones, the consequences of this policy are likely to be felt by the majority of users and devices, throughout the world.

Keep reading

Michigan Supreme Court Rules Unrestricted Phone Searches Violate Fourth Amendment

The Michigan Supreme Court has drawn a firm line around digital privacy, ruling that police cannot use overly broad warrants to comb through every corner of a person’s phone.

In People v. Carson, the court found that warrants for digital devices must include specific limitations, allowing access only to information directly tied to the suspected crime.

We obtained a copy of the opinion for you here (the opinion starts on page 5).

Michael Carson became the focus of a theft investigation involving money allegedly taken from a neighbor’s safe.

Authorities secured a warrant to search his phone, but the document placed no boundaries on what could be examined.

It permitted access to all data on the device, including messages, photos, contacts, and documents, without any restriction based on time period or relevance. Investigators collected over a thousand pages of information, much of it unrelated to the accusation.

The court ruled that this kind of expansive warrant violates the Fourth Amendment, which requires particularity in describing what police may search and seize.

The justices said allowing law enforcement to browse through an entire phone without justification amounts to an unconstitutional exploratory search.

Smartphones now serve as central hubs for people’s lives, containing everything from health records and banking details to travel histories and intimate conversations.

Searching a device without limits can expose a volume and variety of personal information that far exceeds what a physical search could reveal.

Groups including the Electronic Frontier Foundation, ACLU National, and the ACLU of Michigan intervened in the case, filing a brief that called on the court to adopt strict rules for digital searches.

Keep reading

How Israel’s Spy-built Apps Silently Fund Genocide While Infiltrating Your Device

The digital tools millions trust daily—photo editors, casual games, taxi hailers—hide a dark secret: They were crafted by Israeli spies turned tech moguls, funneling profits into apartheid, ethnic cleansing, and the ongoing genocide in Gaza. As Israel wages war under the banner of Zionism, its militarized economy thrives on apps that mine your data, normalize surveillance, and bankroll atrocities. This bombshell investigation exposes the covert Israeli app empire, revealing how even the most innocent downloads fuel a regime built on occupation and bloodshed.

Key points:

    • Hidden owners: Major apps like Facetune, Moovit, and Waze were developed by ex-Israeli military intelligence operatives, laundering their spycraft into Silicon Valley fortunes.
    • Data harvesting risks: These apps often demand intrusive permissions, feeding personal images, locations, and identifiers into Israel’s surveillance-industrial complex.
    • Funding genocide: Companies like Playtika and Crazy Labs openly funnel billions in taxes to Israel’s war economy, with staff actively enlisted in Gaza massacres.
    • Global spyware threat: Behind the apps lies Israel’s Pegasus spyware, sold to dictatorships to crush dissent, murder journalists, and silence Palestinians.
    • Boycott urgency: The BDS movement urges users to purge these apps, breaking Israel’s stranglehold on tech and its economy of occupation.

From military intelligence to your smartphone

Israel’s Unit 8200—a surveillance unit comparable to the NSA—acts as a feeder program for the country’s tech elite. Graduates infiltrate app development, weaponizing civilian software to extract data and revenue. ZipoApps, founded entirely by Unit 8200 veterans, controls photo-editing tools like Collage Maker Photo Editor and Instasquare, boasting over 100 million downloads. Users on Reddit accuse Zipo of bait-and-switch privacy violations, turning open-source apps into paid spyware traps.

Similarly, Facetune, an AI photo editor with 50 million installs, was co-developed by Yaron Inger, who spent five years in Unit 8200. Apple Store reviews warn it’s a “scam,” demanding location tracking and device identifiers. Even ride-hailing apps like Gett and Waze were built by ex-spies, embedding Israel’s military ethos into everyday tech.

“These developers are digital conscripts,” explains a Tel Aviv-based tech whistleblower who requested anonymity. They don’t leave the battlefield—they just monetize it.

Keep reading

How Much of Trump’s ‘Built in America’ Phone Is Actually Built in America?

The Trump Organization unveiled Trump Mobile, “a next-generation wireless provider with bold ambitions and a customer-first mission,” on Monday. The organization also teased the T1 Phone—which is slated for an August release and available for preorder—as a “gold smartphone engineered for performance and proudly designed and built in the United States.” The origins of the phone seem to be more of an aspiration than a reality.

Eric Trump, the executive vice president of the Trump Organization, told conservative podcaster Benny Johnson that “eventually, all the phones can be built in the United States of America” (emphasis added), per The Wall Street JournalGiven the phone’s hardware and $499 price, the Journal determined that the phones will likely be imported from China because “only Chinese makers like Xiaomi and Oppo have hardware to match.” (President Donald Trump threatened to impose 25 percent tariffs on foreign-made phones just last month.)

Max Weinbach, an analyst at market research firm Creative Strategies, also believes that the T1 Phones are Chinese in origin. Based on its hardware, Weinbach says the T1 Phone is a custom variant of the Wingtech REVVL 7 Pro 5G (the T-Mobile version retails for about $170). Wingtech itself is a Chinese semiconductor designer and manufacturer partially owned by the Chinese Communist Party that is listed in the Bureau of Industry and Security’s Entity List, which “identifies persons or addresses of persons reasonably believed to be involved…in activities contrary to the national security or foreign policy interests of the United States.”

Keep reading

Is This Stunning Censorship A Glimpse Into Our Own Future?

The BBC has reported on smartphones smuggled out of North Korea that are setup to spy on citizens and prevent them from using language that is not authorised by the Communist state.

Instead of simply not allowing North Korean people to have such devices, the regime there has decided to manufacture and distribute phones as a tool for further controlling the population amid fears that freedom, in the form of South Korean culture, is encroaching.

The BBC reporter demonstrates how the phone edits words and phrases that are are not acceptable to the North Korean government, and replaces them with language they have sanctioned.

In one example, the reporter types in a South Korean slang word for “boyfriend” and the phone changes it to “comrade.”

A second example shows the reporter typing in ‘South Korea’ and the phone automatically changing it to “Puppet State.”

The phone also covertly takes a screenshot every five minutes, stores the images in a secret folder which the user cannot access, but North Korean authorities can scour through should they wish to do so.

The report also notes that the North Korean Communists have deployed “youth crackdown squads” to patrol the streets listening out for people using South Korean slang or styles of language.

Wild stuff.

“Smartphones are now part and parcel of the way North Korea tries to indoctrinate people,” Martyn Williams, a senior fellow at the Washington DC-based Stimson Center, and an expert in North Korean technology and information, told the BBC.

Williams further noted that North Korea is now “starting to gain the upper hand” in the information war.

Some online pointed out that its ironic that the state funded BBC filed this report, given that people in the UK are being imprisoned over social media posts.

Keep reading

Effects of radiofrequency electromagnetic field exposure on cancer in laboratory animal studies, a systematic review

More than ten years ago, the World Health Organization’s (WHO) International Agency for Research on Cancer (IARC) published a monograph concluding there was limited evidence in experimental animals for carcinogenicity of Radio Frequency Electromagnetic Field (RF EMF).

Objective

The objective of this review was to systematically evaluate the effects of RF EMF exposure on cancer in experimental animals.

Methods

Eligibility criteria: Based on pre-established Populations, Exposures, Comparators, Outcomes, and Study Type (PECOS) criteria, studies in experimental animals of the following study types were included: chronic cancer bioassays, initiation-(co–)promotion studies, and studies with tumor-prone animals.

Information sources: MEDLINE (PubMed), Science Citation Index Expanded and Emerging Sources Citation Index (Web of Science), and the EMF Portal.

Data abstraction and synthesis: Data are publicly available online as interactive visuals with downloadable metadata. We adapted the risk-of-bias (RoB) tool developed by Office of Health Assessment and Translation (OHAT) to include considerations pertinent to the evaluation of RF EMF exposure and cancer bioassays. Study sensitivity was assessed with a tool adopted from the Report on Carcinogens (RoC). We synthesized studies using a narrative approach. Effect size was calculated as the 1% Bayesian Average benchmark dose (BMD) of a respective study when dose–response or a trend was identified (see BMDAnalysisSupplementaryMaterial) (Supplement 1).

Evidence Assessment: Certainty of the evidence (CoE) was assessed using the Grading of Recommendations, Assessment, Developing and Evaluations (GRADE) approach, as refined by OHAT. Evidence from chronic cancer bioassays was considered the most directly applicable to evaluation of carcinogenicity.

Results

We included 52 studies with 20 chronic bioassays No studies were excluded based on risk of bias concerns. Studies were not considered suitable for meta-analysis due to heterogeneity in study design, species, strain, sex, exposure characteristics, and cancer outcome. No or minimal evidence of RF EMF exposure-related cancer outcomes was found in most systems or organs in any study (these included gastrointestinal/digestive, kidney, mammary gland, urinary, endocrine, musculoskeletal, reproductive, and auditory).

For lymphoma (18 studies), with 6 chronic bioassays (1,120 mice, 1,780 rats) inconsistency between two chronic bioassays was not plausibly explainable, and the CoE for lymphoma was rated ‘moderate’.

For brain tumors (20 studies), including 5 chronic bioassays (1,902 mice, 6,011 rats), an increase in glial cell-derived neoplasms was reported in two chronic bioassays in male rats. The CoE for an increased risk in glioma was judged as high. The BMD analysis was statistically significant for only one study and the BMD was 4.25 (95% CI 2.70, 10.24).

For neoplasms of the heart (4 chronic bioassays with 6 experiments), 3 studies were performed in rats (∼2,165 animals), and 1 in mice (∼720 animals). Based on 2 bioassays, statistically significant increases in malignant schwannomas was judged as high CoE for an increase in heart schwannomas in male rats. The BMDs from the two positive studies were 1.92 (95 %CI 0.71, 4.15) and 0.177 (95 %CI 0.125, 0.241), respectively.

Twelve studies reported neoplasms in the adrenal gland (5 chronic bioassays). The CoE for an increased risk in pheochromocytoma was judged as moderate. None of these findings were dose-dependent when compared to the sham controls.

Sixteen studies investigated tumors of the liver with 5 of these being chronic bioassays. The CoE was evaluated as moderate for hepatoblastomas.

For neoplasms of the lung (3 chronic bioassays), 8 studies were conducted in rats (∼1,296 animals) and 23 studies in mice (∼2,800 animals). In one chronic bioassay, a statistically significant positive trend was reported for bronchoalveolar adenoma or carcinoma (combined), which was rated as moderate CoE for an increase in lung neoplasms with some evidence from 2 initiation-(co–)promotion studies.

Keep reading

iPhone Now Collects Your Mental Health Data

True Story: The Health app built into iPhones is now collecting as much personal information on the mental health of each and every one of us as they can get a hold of.

Yet, a search on Google and Brave yielded no results on the dangers of sharing such information over the phone or the internet. Seriously, no single MSM has done an article on why such data sharing might be a bad idea?

To start, in sharing such data, you aren’t just sharing your information; iPhone knows exactly who your family members are. In many cases, those phones are connected via family plans.

iPhone mental health assessments not only ask questions about your mental health but can also infer the mental health status of family members, as demonstrated by the image publicly shared by phone on the benefits of a phone mental health assessment.

Keep reading

CIA Targeting Smartphone App Data

Director of National Intelligence (DNI) Avril Haines, who oversees 18 separate agencies comprising the wider “intelligence community” – including the CIA, FBI, and NSA – has released a “policy framework for commercially available information.” It is not only the very first public confirmation by a US government official that Stateside spying entities acquire extensive data on private citizens from third party brokers, but admission this yield is deeply sensitive. While purportedly setting limits on the use of this information by spooks, the details are vague or non-existent.

“Commercially available information” (CAI) refers to data collected on individuals, typically by their smartphones, and the apps they use, sold by third parties. Via various sleights of hand and ruthless exploitation of regulatory loopholes, US intelligence obtained information not accessible by average citizens, which would typically require a court-approved search warrant to access. Yet, by purchasing this data from private brokers, spying agencies can still claim this snooping is “open source”, based on “publicly available” records.

A particularly rich source of CAI is data hoovered from digital advertising. In-app and website adspace is sold on real-time bidding (RTB) exchanges, and location and other user data is often included as a bonus, to ensure optimal ad targeting. Many data brokers pose as advertisers in order to “scrape” the listings for user information, before selling it on for profit. The value of this data, and the malign purposes to which it can be put, are vast.

Keep reading