Mysterious Phony Cell Towers Could Be Intercepting Your Calls
http://pingpal.io/pingcom/ping-content/uploads/2014/09/2dda1b86-c136-473e-81af-8baf6dd6f41d.jpg Every smart phone has a secondary OS, which can be hijacked by high-tech hackers Source: www.popsci.com The CryptoPhone is an awesome device, but what if you cannot afford one? Or if you want a phone that uses all the normal services and apps? Or an iPhone? Corporations