Question
But phones are relying on ever more — and more powerful — sensors. And algorithms for analyzing their data are becoming more wise. Because of this, even smartphone makers may eventually admit that the current sensor protections aren’t cutting it. “It’s like cat and mouse,” Al-Haiqi says. “Attacks will improve. Solutions will improve.” Then more clever attacks will emerge. And security teams will engineer still more clever solutions. And on and on it goes.
The game will continue, Chakraborty agrees. “I don’t think we’ll get to a place where we can declare a winner and go home.”
According to paragraph 45, how are phone sensor attacks developing over time?
A. They are spending from infected phones into nearby phones.
B. They are becoming easier for security teams to identify and stop.
C. They are becoming more advanced in how they collect and use data.
D. They are starting to target younger generations who use technology more.
choose the correct answer
The game will continue, Chakraborty agrees. “I don’t think we’ll get to a place where we can declare a winner and go home.”
According to paragraph 45, how are phone sensor attacks developing over time?
A. They are spending from infected phones into nearby phones.
B. They are becoming easier for security teams to identify and stop.
C. They are becoming more advanced in how they collect and use data.
D. They are starting to target younger generations who use technology more.
choose the correct answer
Answers
GPT-4o mini
C. They are becoming more advanced in how they collect and use data.