Category: 最新消息

在这里,你可以阅读从FlexiSPY博客的最新消息

  • iPhone 通话录音实现了

    [et_pb_section admin_label=”section” transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off” background_image=”https://blog.flexispy.com/wp-content/uploads/2015/12/grad-dark.jpg”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”on” width_unit=”on” use_custom_gutter=”off” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” column_padding_mobile=”on” custom_width_px=”860px”][et_pb_column type=”4_4″][et_pb_post_title admin_label=”Post Title” title=”on” meta=”off” author=”on” date=”on” categories=”on” comments=”on” featured_image=”off” featured_placement=”below” parallax_effect=”on” parallax_method=”on” text_orientation=”center” text_color=”dark” text_background=”off” text_bg_color=”rgba(255,255,255,0.9)” module_bg_color=”rgba(255,255,255,0)” title_all_caps=”off” use_border_color=”off” border_color=”#ffffff” border_style=”solid”] [/et_pb_post_title][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” text_font_size=”17″ text_text_color=”#444444″ use_border_color=”off” border_color=”#ffffff” border_style=”solid” custom_css_main_element=”margin: 0 auto;||border-radius: 20px;|| padding: 6% 10%;|| border: 4px solid #fff;|| color: #303030;|| background: #fff;|| overflow: hidden;|| -webkit-box-shadow: 0 52px 64px rgba(0,0,0,0.5);|| box-shadow: 0 52px 64px rgba(0,0,0,0.5);”]

    iphone-recording-banner

     

    我们非常荣幸地宣布,FlexiSPY已经 推出了大家期待已久的 — 苹果手机的通话录音功能

    对于我们来说,这是一个巨大的成功!当人们正在搜索手机间谍软件时 ,这项功能无疑会给FlexiSPY加分,让FlexiSPY成为一 个最好的选择。

    如何获取这项功能

    苹果通话录音功能,只适用 于FlexiSPY EXTREME 版本。如果您的目标苹果手机已经安装有  FlexiSPY 的 最新版本的苹果软件(version 4.1.2),您只需要登录自己的私人帐户。进入主屏幕后,看看右上角的图标“update”是否在闪烁 update icon 。如果看到这个图标有显示,就请点击它并接受协议来更新程序

    如果您还对FlexiSPY  iOS软件期待有其它更多的功能 ?  或者您有好的建议,请在下面给我们 留言!

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • 支持安卓最新Marshmallow 版本,获取Telegram 及更多:FlexiSPY 为安卓推出更多的新功能

    今天,我们非常高兴地为FlexiSPY的安卓用户推出一系列的更新。

    包括哪些更新


    支持安卓最新Marshmallow 版本

    安卓6.0 Marshmallow 版本是当前最新、也是功能最全的安卓版本。不是所有的旧安卓系统都可以升级到这个版本,但运营商正在稳中求进地推出选项来让满足大家的要求。 对我们的技术开发团队来说,这是一个巨大的成功;对一直等待这个好消息的FlexiSPY用户,这也是一个巨大的胜利。

    当然,安卓手机不必因为FlexiSPY而必须运行 6.0 版本,我们能够支持的安卓版本是 4.0.3 以上至 6.0 版本。

    获取Telegram

    Telegram 以它的高度加密而震惊世界,同时也能自己销毁记录。我们收到大量用户来电咨询、要求:FlexiSPY是否可以获取Telegram 聊天记录?  现在,我们高兴地告诉大家,FlexiSPY已经做到了!

    VOIP 通话记录

    很久以前,我们就可以获取通话记录了。但是,取代了传统的电话模式,已经有很多很多的手机用户喜欢使用聊天工具进行网络通话。

    因此,我们为广大用户开发了新的功能,FlexiSPY现在能够获取以下这些聊天工具的语音通话记录;

    • Skype
    • Viber
    • Facebook
    • LINE

    如何更新

    如果您的目标手机安装有FlexiSPY 安卓软件并运行在 full或 limited 工作模式,您就能够远程更新目标手机上的程序。

    首先,请检查目标手机是否安装有最新版本的 FlexiSPY 的安卓软件。您只需要登录自己的私人管理帐户。进入主屏幕后,看看屏幕的右上方是否有图标“update”  update icon 在闪烁 。如果看到有这个图标,就请点击它并接受协议来更新目标手机上的FlexiSPY 软件

    如果没有update图标显示,这说明手机的 FlexiSPY软件是最新版本的。

    分享您的经验

    如果您还对FlexiSPY  安卓软件期待有其它更多的功能 ?  或者您有好的建议,请在下面给我们 留言! 我们将会继续努力,以满足广大用户的需要!

  • FlexiSPY能够获取 Tinder  聊天记录

    当您的另一半有可能在隐藏不可告人的秘密时,不必成为福尔摩斯,您就能通过Tinder(约炮神器) 发 现蛛丝马迹。

    他们也许正在使用Tinder,想要了解他们的关系究竟发展到什么程度,虚伪的背后隐藏了多少谎言——“他是不是真的在外面偷腥?”如果他们在玩配对游戏和文字聊天,然而这就是您的第一条线索!

    玩笑之后,于是我们可以想到:对于FlexiSPY用户来说,他们的 Tinder 聊天内容是多么重要啊!现在,我们激动地向大家宣布:最新的版本能够让所有的安卓用户可以了解Tinder记录了!

    如何获取此项功能

    目前,只有安卓用户可以获取此项功能。但我们保证—iOS 团队也不会让苹果用户等待很长的时间。

    如果目标手机已经运行有 FlexiSPY 软件,您就可以使用远程更新功能。请登录您的管理平台,查看屏幕的右上方是否有”update“图标在闪烁。只需要轻轻地点击它,就可以实现软件更新。

     

     

  • Get 20% Off The Brand New FlexiSPY Desktop

    Have you ever wished that you could have FlexiSPY on your PC or MAC?

    Have you ever wanted to track your child’s activity across all their devices?

    The good news is that now you can.

    In a few weeks we will be launching FlexiSPY desktop, a new product that lets you monitor PCs and MACs.

    This release is a huge deal for our customers and us – it means that you will finally be able to have seamless monitoring over all devices.

    Here’s a little preview of what FlexiSPY for Desktop does:

    FlexiSPY Desktop allows you to keep an eye on almost every aspect of the computer it’s installed on – but we do have our own favorite features.

    Browser History

    See a list of sites they visited

    Search Terms

    See what they were searching sites like Google and Yahoo for

    Keystrokes

    See all keystrokes that were made in-browser

    IM Messages

    Read the chat logs for apps like Skype

    Desktop Screenshots

    Take screenshots of the desktop

    Application Activity

    See what applications they are using the most

    To get 20% off the brand new FlexiSPY Desktop, you’ll need to pre-register by filling out the form below. Also to reiterate, if you’d like to be a beta tester – click here

    What device do you want to monitor?

  • The Danger of Online Grooming: Boys Are Also at Risk

    The Danger of Online Grooming: Boys Are Also at Risk

    Today, all kinds of electronic devices — and especially smartphones — have become the most important way that children and teenagers stay connected to one another.

    According to the Pew Research Center, 92 percent of American teens go online daily, and 24 percent are online almost constantly. Most of this occurs through their smartphones, a device that 88 percent of teens own or have access to.

    Parents, worried about the threat of violence and possible sexual predators outside their homes, think their children are safe when in their rooms. Unfortunately, many of these parents have no idea what their children are doing online and are unaware of the equally large, or even larger, threat that online predators pose to their kids.

    While the internet has made our world smaller in many good ways, it has also increased the ability of predators to find and seduce their victims. They do this most successfully through a process known as “grooming,” where predators engage in a number of actions to befriend vulnerable victims in order to sexually abuse and exploit them. Although online predators do most of their grooming virtually, they eventually have to meet their victims in the offline real world to reach their goal: sex with the minor. At this point, their victims are usually eager to meet the person they’ve developed a friendship with online and completely trust that their friend is the person who he says he is. He seldom is.

    Mind the Gender Gap

    When people think about sexual abuse victims, they typically picture girls. In a study conducted by the Centers for Disease Control and Prevention and the U.S. Department of Justice, one in six women were found to be the victim of rape or attempted rape; the statistic for men was one in 33. This number may be accurate, or it may just reflect the fact that sexual assaults on women are reported more often than sexual assaults on men.

    When it comes to grooming, boys are targeted just as often as girls, but because of stereotypes, parents don’t monitor their sons nearly as much as they do their daughters. Many behaviors are simply written off as “boys being boys” instead of the warning signs that they really are.

    Because boys are thought of in terms of “manly” traits, it is assumed that people can’t make them do anything they don’t want to do. But through empathy, coercion, and shame, sexual predators can not only make them do what they want but also keep them from telling anybody about it. Their masculinity is used against them: Boys are taught that expressing their feelings is womanly, and they don’t want to be accused of being gay.

    When they drink, take drugs, skip school and get new things like cellphones — all due to the groomer — the boys would rather have their parents, counselors and other adults in their lives attribute it to bad behavior than to the fact they’re being sexually exploited. As stated in “Same Risk, Different Gender,” a video by The Blast Project, “Boys and young men often prefer the bravado of youth offending rather than admit to being a victim of grooming and sexual exploitation.”

    A Worst-Case Scenario: The Breck Bednar Case

    A gruesome example of this occurred in the Breck Bednar murder case in Surrey, England, in 2014. Breck was a 14-year-old computer aficionado who spent hours gaming online. He fell prey to a man named Daynes, who represented himself as a 17-year-old high school dropout and computer engineer running a multimillion-dollar company. As the friendship deepened, and Breck became more secretive, his mother, Lorin Lefave, became suspicious.

    She asked other teachers and parents their opinion on the relationship, and they didn’t see anything wrong with it. Then, she and her ex-husband offered to take Breck to meet Daynes in person, but Daynes said he was too busy. Finally, Lefave called the police, who didn’t seem to understand the enormity of the situation. She even provided them with Daynes’ full name and the county where he lived, but they never acted on the information.

    When Lefave took away her son’s computer and phone, Daynes secretly sent Breck a new phone. Daynes then convinced Breck that he was dying and wanted to hand his computer company over to Breck, a dream come true for the computer buff. Lying to both his parents about where he was going, Breck got into a taxi paid for by Daynes and went to Daynes’ apartment. Sometime that night, Daynes murdered Breck and then texted images of his body to other boys in their gaming group. He is currently serving a life sentence in prison after pleading guilty to murder with sexual and sadistic motivation.

    Warning Signs vs. Gender Assumptions

    Lefave set up the Breck Foundation to bring Internet safety awareness to schools, police, and parents. Although she recognized the signs and sought to save her son from his predator, she was unable to convince authorities that something suspicious was going on until it was too late. As she told the Guardian, “Boys may report this less, but I want everyone to understand that they can be groomed and hurt… by people who are not who, they say they are online.”

    The Breck Foundation and other organizations like The Blast Project are trying to teach authorities and professionals to base their opinions on the warning signs and not on gender assumptions. Boys WILL be boys, but they will also become the victims of sexual exploitation if they’re not careful. Parents should be vigilant with their children, regardless of their gender, and know what they’re doing online and on their phones. Look for indicators that your child may be involved in something suspicious, and keep tabs on their activity by using a phone monitoring software. Do everything you can to keep your child safe from predators.

    Sources:

    http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/

    http://www.theguardian.com/lifeandstyle/2016/jan/23/breck-bednar-murder-online-grooming-gaming-lorin-lafave

    http://www.boystown.org/parenting/article/victim-grooming-protect-your-child-from-sexual-predators

    http://www.safekids.com/how-to-recognize-grooming-2/

    https://www.youtube.com/watch?v=1cbXXjzkh90

    http://www.missingkids.com/en_US/publications/NC70.pdf

  • We Are Hiring!

    The FlexiSPY portal is showing its age a little, and while its functional, it surely needs some love – It’s time for a redesign.

    That’s why we are looking for Designers and Contributors to help us create a set of possible new designs.

    In return, we are giving away Amazon vouchers, not only to designers, but to those of you love our product and have ideas for improvements.

    We need the following:

    Designers

    If you are a regular user of FlexiSPY and you are a UI designer with talent and ideas, we want to engage you for a full project, and you will receive a $50 Amazon Voucher for your design.

    The design must be original though, so copying a generic template from the web won’t qualify.

    Please send us the following and you will automatically receive a $50 voucher, and you will be considered for the job.

    • Redesign of Dashboard
    • Redesign of Call Records
    • An email explaining how you would approach a full portal redesign and how much you would charge to deliver a redesign.

    Send us your design

    Contributor

    If you are a regular use of FlexiSPY you can win a $5 Amazon voucher

    Simply give us your ideas for improvement to make the portal easier to use and to deliver a better experience. We will consider these, and any idea that we will use will be published on the blog and you will receive a $5 voucher.

    Send us your suggestions

    Winning Design

    We will share these designs with the FlexiSPY community, and you can vote for the design that you want to see in your portal.

  • Win A 10 Dollar Amazon Voucher – No Strings Attached

    Win A 10 Dollar Amazon Voucher – No Strings Attached

    Buy FlexiSPY and get a 10 dollar Amazon voucher.

    Most people say their customers are important to them. We’re putting our money where our mouth is and offering you $10 dollars to answer a few questions.

    Here’s how it works.

    3 days after you purchase FlexiSPY, you will be invited to complete a survey, for which you will receive a minimum of a 5 dollar amazon voucher upon completion. If you provide more detailed answers in the survey’s text boxes then you will qualify for a larger 10 dollar voucher.

    This is another great reason to buy FlexiSPY.

    Buy Now

  • How To Spy On Android Telegram Messenger Chats

    How To Spy On Android Telegram Messenger Chats

    Since it’s debut on iOS in 2013, Telegram has quickly become the go-to messaging app for people who are concerned about their privacy. From their own website, they claim to now boast 100,000,000 Monthly Active Users

    When we first learned of Telegram and it’s success we were dumbfounded. Why would so many people move to an obscure, security-centric messaging app? We thought that everybody was OK with government agencies watching our every move. After all, after a brief shrug of the shoulders, the NSA scandal seemed all but forgotten; current affairs and the political scene have TRUMPED our privacy concerns.

    So as soon as we learned of Telegram’s success, we knew it was something our customers would want us to capture, in fact many of you did ask for it, and now it’s arrived.

    How To Spy On Android Telegram Messenger Chats

    Below we’ll quickly go over the steps you need perform to get Telegram Messenger Chats spying rolling, at most it should only take you 1-2 minutes, for other’s it’s enabled already.

    At this time we support version 3.17.1 of Telegram

    Check your version number of FlexiSPY

    The minimum version of FlexiSPY for Android that you’ll need to be running is Version 4.0.3. You can check your current version by doing the following:

    1. Head to your account settings page
    2. Under the license profile tab, click the Active tab, then look for the column that shows your product version number and make sure it’s at or above 4.0.3check-product-version
    3. If you’re running at least 4.0.3 then you’ll already have Telegram capturing enabled, but remember, the Android phone needs to be rooted and running FlexiSPY in Limited or FULL mode. If you need help with rooting the phone and installing FlexiSPY in full mode then you can check out our installation service here
    4. If you are not running at least 4.0.3 but you’re running FlexiSPY on a rooted phone that has Limited-1 or Full mode, then you should see a flashing update icon on the top right-hand corner of your screen. By clicking it you’ll automatically update to the latest version of FlexiSPY and you’ll be good to go!

    Suggest our next feature

    Want to suggest the next IM that FlexiSPY captures? Let us know what you’d like to see in the comments section below!

  • Apple vs. The FBI  What Will It Mean for the Rest of Us When It Comes to Smartphone Security?

    Apple vs. The FBI What Will It Mean for the Rest of Us When It Comes to Smartphone Security?

    [et_pb_section admin_label=”Section” fullwidth=”on” specialty=”off”][et_pb_fullwidth_header admin_label=”Fullwidth Header” title=”Apple vs. The FBI
    What Will It Mean for the Rest of Us When It Comes to Smartphone Security?” background_layout=”dark” text_orientation=”right” header_fullscreen=”on” header_scroll_down=”off” background_url=”https://blog.flexispy.com/wp-content/uploads/2016/02/fbi-vs-apple.jpg” parallax=”off” parallax_method=”off” content_orientation=”center” image_orientation=”center” title_font=”Playfair Display|on|||” title_font_color=”#ffffff” max_width=”750px” custom_button_one=”off” button_one_letter_spacing=”0″ button_one_use_icon=”default” button_one_icon_placement=”right” button_one_on_hover=”on” button_one_letter_spacing_hover=”0″ custom_button_two=”off” button_two_letter_spacing=”0″ button_two_use_icon=”default” button_two_icon_placement=”right” button_two_on_hover=”on” button_two_letter_spacing_hover=”0″ subhead=”by Ian W. Staff Writer at FlexiSPY“]

    [/et_pb_fullwidth_header][/et_pb_section][et_pb_section admin_label=”section”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”on” width_unit=”on” custom_width_px=”728px” use_custom_gutter=”off” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” column_padding_mobile=”on” custom_css_main_element=”margin: 0 auto;”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    For those who are unaware, the FBI is currently petitioning Apple to let its iPhone encryption be cracked. The FBI wants Apple to allow them access to a phone linked to the San Bernardino terrorist attack on on December 2nd 2015 which killed 14 people.

    Apple have already gone on record to state that they do not wish to grant the FBI access to the data on the device (an iPhone 5C belonging to Syed Rizwan Farook) but what does this really mean? Are Apple siding with the terrorists or are they protecting their own self interests?  What does it mean for the rest of us who feel we may need to encrypt our devices?  Surely, if this encryption can be bypassed at any time from those above, hasn’t our privacy already been compromised?

    Why encrypt your phone if you have nothing to hide?

    There is the old saying of being innocent until proven guilty.  So should the average consumer really need to encrypt their phone and, if they chose to, are they not admitting that they have something to hide?  Otherwise, why the need for such secrecy with their smartphone data?

    Encryption is there as an extra level of protection but it is something that nearly most of us will never need to use.  However Apple likes to be cautious and, since it released iOS 8, device data such as photos, messages, contacts and reminders are encrypted by default.  That means you are encrypting your own data without being asked or told.  But it’s okay because if Apple does it must be acceptable, right?

    Is that a good thing?  Or are Apple assuming that everyone inevitably has something to hide and that is why you don’t get a choice to not encrypt your data?  Are Apple advocating nefarious uses of their own devices by doing this and is their stand against the FBI merely making the world’s wealthiest technology company now a haven for criminals?  US law enforcement thinks so.

    Is Apple advocating terrorism?

    Apple’s smartphones are the most widely used on the planet so it makes sense that these devices won’t always be used by the cleanest of people. They are highly sought after and are seen as a status symbol in most countries, with such a large customerbase Apple has to look as if it takes its customers data and security seriously.

    Except there was that issue with iCloud being hacked and tons of leaked photos of celebrities being leaked as iCloud was compromised…

    …and there was that time where the Apple device passcode could be easily bypassed.

    …oh and right now you can permanently brick an Apple device by setting the date to January 1st, 1970.

    So, perhaps, in hindsight, Apple could have done a little better securing their devices (and need I mention the ever ongoing battle for jailbreaking?) Or maybe Apple didn’t bother to try harder with device encryption because it never planned for something to happen like this?  For those who are unaware, on a jailbroken device you can bypass the Apple device encryption using SSH, ccrypt and a little reading of this article here.  So, it doesn’t matter if the device is jailbroken or not, it can still be compromised if you know how.

    Granted, that article is a little dated but you get the idea.  Specifically, the scary part is where it says that while the data on the device is encrypted it becomes unenecrypted as soon as the device boots up (e.g. after you enter your passcode), so, you bypass the passcode and the phone thinks it has booted up and all the encrypted data becomes yours.

    The real question though is that if Apple designed iOS encryption so that even they cannot break it if the FBI does succeed in cracking the encryption has Apple been lying to us the whole time?  There is an interesting article here about how Apple’s encryption is tied to the unique UID of each iOS device and how they use what is called a ‘secure enclave’ to stop the UID getting cracked.  It is quite a complex and lengthy read but it basically says that there is no way that the encryption can be cracked, not even by Apple, because that is how Apple designed it.  Lock the door and throw away the key.

    So, everything sounds secure?  Right?

    How secure is secure?

    For this case Apple gave the FBI four methods to use to get data from the iPhone 5C.  While we don’t know what the other three methods were we do know that one was of course ICloud (did I mention that it was hacked and Apple did nothing about it?).   Articles here and here explain that iCloud, while seeming a secure online backup option is not without its limitations.

    In fact, those articles mention that there are off the shelf software packages people can buy that can extract the supposedly secure iCloud backups straight from someone’s iCloud account as long as you know the Apple account email address and password and that can be gained with a little social engineering and the use of the forgotten password option.

    Once you have accessed the backups from the Apple ID account you use the third party software to exact and download the data to your computer and there you have it.  But here is where there is a glaring issue which was recently raised in this case.

    It Is alleged that two things transpired that stopped the data from the iPhone 5C being uploaded to iCloud. This is according to Apple.

    • The device owner turned off the iCloud backup feature prior to the terrorist attack, thus terminating any future backups
    • San Bernardino county reset the iCloud password of the device without consent meaning that the passwords did not match on the phone and iCloud account so the backups ceased.

    Apple engineers discovered the second point when they travelled to San Bernardino to get physical access to the device.  If the password had not been reset, they would have been able to get a more recent device backup from iCloud.

    What’s more it actually turns out that the San Bernardino government has a contract with MobileIron Inc. who provide mobile device management software at the price of $4 per phone.  This software would have allowed the FBI access to the data of any device that had this software installed on it immediately.  That would have kept the FBI happy and made this whole case go away.

    The software works by performing a brute force attack on the passcode until it correctly guesses what it is.  A brute force attack uses all variations of letters and numbers and words from the dictionary to literally throw every random password it can generate at the problem until it is solved.  But this takes time.  Anyone who has tied to brute force attack something so innocent as a zip file whose password you have forgotten knows that it can take months, even years and success is never guaranteed.

    But the San Bernardino government failed to install the software on any of their devices.

    This is because there is no countrywide policy to do so and instead departments in different counties can essentially make their own rules.  With the iPhone 5C also being the one iPhone Apple released without a fingerprint sensor and touch ID it means it is not possible to use the fingerprint of the dead terrorist to unlock the device either.

    Who’s really to blame?

    So far, it seems that Apple could be blamed for not adding security features such as Touch ID to their devices sooner but, for sure, the San Bernardino government is not doing itself any favours either.   Apple knows this. Apple could essentially lay the whole blame on the FBI and the fact that they changed the device password and it is because of that that no more recent data could be obtained.  So Apple are blaming the FBI and the FBI is blaming Apple. They say that because the methods they provided to access the data were not good enough they are now pushing for a backdoor instead.

    And this is where Apple says no.  So, you have to wonder, what is more important overall?

    The privacy of the living or the rights of the dead?

    Who does Apple see as more important?  If Apple wanted to be more constitutional, they would not have immediately said that they would not honor the FBI’s request for a backdoor.  Apple surely can do it, even if it means rewriting the iOS code to do so.  They just seem to be favouring the privacy rights of the living instead, after all, Apple has to protect its bottom-line as well.

    On the other hand, has the FBI been waiting for a case like this to years to finally legitimize the need for a security backdoor in popular phone operating systems such as iOS?  And don’t forget that the device in question was loaned to the terrorist from his company also which means that surely the company is responsible for the contents of whatever is on the device, regardless of what the device is used for because we all know that though you pay good money for your device you never truly own it.

    However, if Apple should give in to the FBI and create the backdoor it means that, should that backdoor fall in to the wrong hands, every encrypted iPhone or iPad device is now at risk and could easily be compromised.  That means that our privacy is no longer safe. It is no wonder that Edward Snowden, via Twitter, is following this case closely. Linking specifically to this article which explains how you can set a custom 11-digit passcode for your device that even the FBI couldn’t crack, even if they do get their backdoor.

    Our thoughts and conclusion

    Privacy is something that ironically you may think we believe that everyone is entitled to.  Everyone always says to set a strong password on your online sites and your smartphone devices and now it is slowly dawning on people the value of actually doing this. It isn’t fair that the FBI should get their backdoor because we have a right to privacy but, on the other hand, getting information from the device of a terrorist could also help prevent further attacks so we see both sides of the story.

    It is hard to pick sides on this, and this case will be long and drawn out and could have ramifications for all of us when it comes to digital security and privacy.  Right now though something else is brewing.  A warning of sorts that could taint the Apple brand.

    Apple always believed that it had a ‘killer’ phone, with ‘killer’ apps and ‘killer’ hardware and software and it is proud of all its devices and that is what helped it become the technology titan it is today. But whatever the results of this case turn out to be, in the eyes of many people already Apple already has the ‘killer’ device that they have been wanting all along. Except this time, it is the ‘killer’ device for all the wrong reasons and is seen already as enabling terrorism.

    Whether or not Apple can shake off this image, and any boycotts it may endure, remains to be seen. I think it can but the nature of this case and the evidence on both sides is what makes this this case one of the most interesting in recent times for online privacy advocates.  Can you put a price on this entire situation?  It seems $4 a month is pretty cheap.  Unfortunately, for whatever reason, the total cost of this entire case, for Apple, for the FBI, for our privacy and for our freedom is going to be far greater.

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • Save 15% With Our Black Friday / Cyber Monday Sale

    Save 15% With Our Black Friday / Cyber Monday Sale

    [et_pb_section admin_label=”section” transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”on” width_unit=”on” custom_width_px=”880px” use_custom_gutter=”off” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” column_padding_mobile=”on”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    Crazy enough it’s that time of year again.. Our mailboxes are overflowing with promotions and deals – Black Friday and Cyber Monday must be here!

    So in the spirit of the holidays, we’re offering everyone a 15% DISCOUNT on 12-Month Subscriptions of our most popular products; FlexiSPY EXTREME and FlexiSPY PREMIUM!

    How to redeem the discount

    Use the following promo code during checkout to receive your discount.

    BLACKFRIDAY2015

    *You will only be able to use this promo code using the special shopping cart links below.

    After making your selection you’ll be brought to your checkout cart where you can then enter the 15% OFF Promo code.

    *Offer expires 12-02-2015

    [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row admin_label=”Row” make_fullwidth=”off” use_custom_width=”on” width_unit=”on” custom_width_px=”880px” use_custom_gutter=”off” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” column_padding_mobile=”on”][et_pb_column type=”1_2″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”center” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    FlexiSPY PREMIUM Special Checkout Link

    [/et_pb_text][et_pb_blurb admin_label=”Blurb” url=”https://ecom.flexispy.com/cart/addItem?callerSite=flexispy&lang=en&purchaseType=New&retailItemCode=FSPYR8201YR&promo=true” url_new_window=”on” use_icon=”off” icon_color=”#7EBEC5″ use_circle=”off” circle_color=”#7EBEC5″ use_circle_border=”off” circle_border_color=”#7EBEC5″ image=”https://blog.flexispy.com/wp-content/uploads/2015/11/FLEXISPY-premium.jpg” icon_placement=”top” animation=”off” background_layout=”light” text_orientation=”left” use_icon_font_size=”off” use_border_color=”off” border_color=”#ffffff” border_style=”solid” alt=”flexispy premium”] [/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”center” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    FlexiSPY EXTREME Special Checkout Link

    [/et_pb_text][et_pb_blurb admin_label=”Blurb” url=”https://ecom.flexispy.com/cart/addItem?callerSite=flexispy&lang=en&purchaseType=New&retailItemCode=FSPYR8601YR&promo=true” url_new_window=”on” use_icon=”off” icon_color=”#7EBEC5″ use_circle=”off” circle_color=”#7EBEC5″ use_circle_border=”off” circle_border_color=”#7EBEC5″ image=”https://blog.flexispy.com/wp-content/uploads/2015/11/FLEXISPY-EXTREME.jpg” icon_placement=”top” animation=”off” background_layout=”light” text_orientation=”center” use_icon_font_size=”off” use_border_color=”off” border_color=”#ffffff” border_style=”solid” alt=”flexispy extreme”] [/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section]

  • FlexiSPY Is Now Compatible With iOS 9.0.2

    FlexiSPY Is Now Compatible With iOS 9.0.2

    [et_pb_section admin_label=”section” background_color=”#ffffff” inner_shadow=”off” parallax=”off” transparent_background=”off” allow_player_pause=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off” custom_css_main_element=”background-image: -webkit-linear-gradient(287deg,#270530 10%,#196d82 36%,#fff 70%);||background-image: -moz-linear-gradient(287deg,#270530 10%,#196d82 36%,#fff 70%);||background-image: -o-linear-gradient(287deg,#270530 10%,#196d82 36%,#fff 70%);|| background-image: -ms-linear-gradient(287deg,#270530 10%,#196d82 36%,#fff 70%);|| background-image: linear-gradient(163deg,#270530 10%,#196d82 36%,#fff 70%);|| background-repeat: no-repeat;”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” use_custom_gutter=”off” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” column_padding_mobile=”on”][et_pb_column type=”4_4″][et_pb_post_title admin_label=”Post Title” title=”on” meta=”on” author=”on” date=”on” categories=”on” comments=”on” featured_image=”off” featured_placement=”below” parallax_effect=”on” parallax_method=”on” text_orientation=”center” text_color=”light” text_background=”off” text_bg_color=”rgba(255,255,255,0.9)” module_bg_color=”rgba(255,255,255,0)” title_font_size=”42px” title_all_caps=”off” meta_text_color=”#b7b5c1″ use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

     

    [/et_pb_post_title][et_pb_blurb admin_label=”Blurb” url_new_window=”off” image=”https://blog.flexispy.com/wp-content/uploads/2015/11/ios-9.0.2.png” animation=”bottom” background_layout=”dark” text_orientation=”center” use_icon=”off” icon_color=”#108bf5″ use_circle=”off” circle_color=”#108bf5″ use_circle_border=”off” circle_border_color=”#108bf5″ icon_placement=”top” use_icon_font_size=”off” use_border_color=”off” border_color=”#ffffff” border_style=”solid” custom_css_main_element=”margin-top: 0px;||padding-top: 0px;||padding-bottom: 0px;||margin-bottom: 0px;” alt=”ios 9.0.2″] [/et_pb_blurb][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” module_class=”colordark” max_width=”700px” text_font_size=”16″ text_text_color=”#6f7c82″ use_border_color=”off” border_color=”#ffffff” border_style=”solid” custom_padding=”30px|50px|30px|50px” custom_css_main_element=”margin-top: 0px;||margin: 0 auto;||color: black;||padding: 2em;”]

    We are very happy to announce that you can now install and run FlexiSPY PREMIUM and EXTREME on any jailbroken iOS device running iOS 9.0.2!

    How can I get FlexiSPY on my iOS 9.0.2 device?

    The first thing you need to do is jailbreak the device, we have a guide for that, which explains all the steps, that you can read, here

    All it takes is a few minutes and the TARGET device in your hand to jailbreak the device with help from access to a PC and you will be up and jailbroken in no time. After being jailbroken, you just follow the FlexiSPY installation steps.

    New Installation Service

    If you don’t have the time to jailbreak an iOS device but you want a quick and easy way to install FlexiSPY then you might be interested in our new installation service, where we jailbreak and install FlexiSPY for you!

    Whatever method you use, the installation of FlexiSPY always stays as simple as possible, so why not start enjoying FlexiSPY on your jailbroken iOS 9.0.2 device today!

    [/et_pb_text][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”center” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section admin_label=”Section” fullwidth=”off” specialty=”off”][et_pb_row admin_label=”Row”][/et_pb_row][/et_pb_section]

  • FlexiSPY Is Now Compatible With Android 5.1.1

    FlexiSPY Is Now Compatible With Android 5.1.1

    Great news! You can now install and run FlexiSPY PREMIUM and EXTREME on Android devices running up to OS 5.1.1!

    Our Android development team has been hard at work since the last version on Android (Lollipop 5.0) was updated to 5.1.1, so we are excited to announce our compatibility!

    This announcement also falls in step with our other news, we now have a FlexiSPY installation service.

    Now it’s easier than ever to install FlexiSPY onto an Android phone running 5.1.1

    So, head on over to our Android page to check out all that FlexiSPY can do you for you.

  • New Feature | KiK Messenger Spy For Android

    New Feature | KiK Messenger Spy For Android

    We’ve been listening carefully to what IM’s our customers want to be able to monitor, and lately we’ve received a lot of requests for KiK Messenger.

    So, we are very happy to announce that in our latest FlexiSPY for Android release, you can now Spy on KiK Messenger!

    Why spy on kik messenger?

    Founded in 2008, Kik Messenger is a chatting app that has recently exploded in popularity, now holding over 200 million registered users. If you are now using a spy app that doesn’t monitor KiK, you’re missing out, as there’s a very real chance that the person you want to keep tabs on is using this chatting app.

    Compatibility & Update Options

    For now this feature is Android onlybut we are looking at the possibility of KiK Messenger Spy for iPhone in the future.

    If you already have FlexiSPY installed on an Android device running in Full Mode, you can remotely update the FlexiSPY app from your dashboard, just look for the flashing update icon, click it, and you’ll be good to go.

    If you don’t have FlexiSPY yet, then now’s the perfect time to buy, as the new KiK Messenger spy feature is already included in the new release.


    Get Started Today

  • Try Before You Buy | We Now Have A Demo

    Try Before You Buy | We Now Have A Demo

    Urgent Update: we’ve successfully made everyone’s dreams come true!

    Well, while not really so great a feat, we still wanted to let our blog readers know that now you can take FlexiSPY for a spin before you buy.

    That’s right, we’ve added a demo.

    Why add a demo now?

    The pressure for a demo has always been on from site visitors who haven’t joined the FlexiSPY fan club yet. but making a demo takes time and resources, and while our development team is constantly working on keeping our software pushing ahead, we had always felt that allocating resources to the creation of a demo was a waste of time compared to keeping our team dedicated to product development.

    It turns out though, that it didn’t take too much effort to get the demo up and running, and now we’ll have the “please add a demo” headache go away.

    What you can do with the demo

    With the demo you don’t need to install any software onto a phone, you just head over to the demo from the link below, click login, and you’ll then be greeted with what you’d normally see after logging into your paid FlexiSPY account. The only limitation with the demo is that you can’t install our software onto a phone with it—that’s reserved for paying customers.

    So, if you’ve been wanting a better glimpse into what you’re getting with FlexiSPY—before you buy—then now is a good time to check out what we have to offer!

    If you have any questions about the demo, or any suggestions, please let us know in the comments section below, we are happy to take your suggestions and questions.

    Check out our demo!

  • FlexiSPY | Now Supporting iOS 8.4

    FlexiSPY | Now Supporting iOS 8.4

    Just a few hours after 8.4 was released, news broke out that an official iOS 84 Jailbreak was available, made possible by the Jailbreak team TaiG.

    Immediately after being released, our iOS developers were hard at work integrating FlexiSPY with the jailbreak, and now they’ve done it, FlexiSPY now supports iOS 8.4, and you are now safe to update the iOS device to this version.

    Update now or risk being stuck

    While jailbreaking is perfectly legal, and will not brick your device in any way, Apple likes to keep things locked down. Based on their past efforts to prevent jailbreaking, it is likely that they will soon make another update to iOS, an update which will render the jailbreak null.

    Once Apple pushes a new iOS release, and if you update to that release, expect to be stuck with an un-jailbreakable device for 3-6 months, and of course, if you want to run FlexiSPY on an iPhone or iPad, it must be jailbroken first, which we’ve written a guide for. 

    Once you’ve taken care of the jailbreak, you can go ahead and re-install FlexiSPY or install for the first time, which you can do by purchasing a license on our site, here 

  • Our 2015 Valentine’s Day Gift To You

    Every Valentine’s Day we get a huge increase in the number of people buying FlexiSPY.

    This year, we wanted to give back and help you purchase your Valentine’s Day gift.

    From today until the 17th, we’ve taken 5% OFF the initial payment for all recurring FlexiSPY products.

    We rarely give out discounts, and when we do, we’re only doing so if it’s of actual use to our customers.

    So if you have been holding out, looking for a cheaper option, then now is the time to buy.

    HEAD BACK TO FLEXISPY

  • FlexiSPY For Android Update 2.3.5

    FlexiSPY For Android Update 2.3.5

    We’re happy to announce that the latest version of FlexiSPY for Android is here! In this release, we really tried to act on the feedback that you guys put forward to us, and we’re very excited about the new offerings! So, what’s changed?

      AutoUpdate – We’re really proud of this feature in our latest release. After updating to the latest version of FlexiSPY for Android (2.3.5) and, if the device is running on Limited 1, or Full mode, the device will be able to auto-update to future FlexiSPY releases!

      RemCam – When activated, RemCam now captures a photo from the back, AND front camera simultaneously!

    BBM – We’ve added support for Location Capture and Sticker Capture!

      Facebook We now support video capture for Facebook!

    There’s also various other changes and improvements that we didn’t want to squash into this article, so for a more in-depth look into what the latest release gives you, check out our Android Page.

    Most of these changes started off as great suggestions by people that have been fans of our software for a long time. If you suggest an improvement for FlexiSPY, we’ll review it, and it could eventually get passed along to our developers. So, why not brainstorm a few things you’d like to see, and leave your thoughts in the comments section below, it’s a win-win for everyone and we’d be delighted to hear from you!

     

  • FlexiSPY Reviews By Real Customers

    FlexiSPY Reviews By Real Customers

    [et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    There are thousands of people out there looking to find answers that FlexiSPY can provide.

    As an existing customer, you already know the benefits of choosing a company who understands its products can literally change lives.

    We’re not fancy internet marketeers or salespeople – our passion lies in combining great technology with great customer support to help people.

    That’s why we’re asking for your help in getting this message out.

    Customer reviews let others, like you, know that FlexiSPY is delivering on our promise to provide the best spyphone product we can. If you’re not sure what to write, new to writing product reviews or simply stuck for inspiration, here’s a list of things you could mention in your review

    • Do you have an interesting story about how FlexiSPY has changed your life?
    • What was your reason for buying FlexiSPY in the first place?
    • Was there a problem you needed to solve using spyphone technology?
    • Were you able to solve your problem?
    • What do you think of FlexiSPY as a product?
    • Does it do what it said it would?
    • Did it meet your expectations of a spyphone product?
    • If you’ve used any other spyphone software, how does FlexiSPY compare to those?
      • If you were advising someone on purchasing a spyphone solution, what would your advice be to them?
      • What considerations would they need to make before making a decision?

    If you having difficulty with your software, this is not the right place to ask for technical help. Please log in to your FlexiSPY Portal and click on the Live Support tab. Our customer support representatives will be happy to assist and will do their best to help you out with whatever you need.

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • Eavesdropping in America: Is it Legal?

    Eavesdropping in America: Is it Legal?

    If you’re about to buy mobile spy software, you might be asking yourself,
    “Am I going to go to jail for using it?”

    Elvis - Eavesdropping in America

    The short answer is, “it depends.”

    OK, that was a typical lawyer’s response to any question.  So, I’ll explain it so you can avoid getting thrown into the slammer.

    In the U.S. – for the most part – it is perfectly legal to record telephone conversations, as long as one party to the conversation consents to the listening or recording.  If someone allows you to install the spyphone software on their phone, you can legally record or listen to their calls.

    Let’s start with federal law.  You might be asking, how would that apply to me?  Well, more than 2.5 million Americans live on military bases.

    If you live on federal land, then you’re covered by federal law.  The seminal case for federal call interception law is Simpson v. Simpson (5th Cir. 1984).  In Simpson, the Court ruled that Congress never intended to prohibit a person from intercepting a family’s member’s telephone conversations.  So, under federal law, no consent is even required.  The courts have decided Congress left call interception up to the states and no federal eavesdropping law applies.

    What if I don’t live on federal land?  If you don’t live on federal land, state eavesdropping laws apply.  In 38 states, one party must consent to the listening or recording of a telephone conversation.  This means that if you install monitoring software on a phone with the owner’s consent, you can legally listen to and record the conversations on that phone.

    In a one party consent state, as long as the call is intercepted or recorded without criminal or tortious intent, there can be no prosecution for violation of an eavesdropping law.  Copeland v. Hubbard Broadcasting, Inc., 526 N.W.2d 402 (Minn. Ct. App. 1995).  For instance, see Mo. Rev. Stat. § 542.402 (“An individual who is a party to a wire communication, or who has the consent of one of the parties to the communication, can lawfully record it or disclose its contents, unless the person is intercepting the communication for the purpose of committing a criminal or tortious act.”).


    “INTERCEPTING AND RECORDING THE CONVERSATIONS OF YOUR CHILDREN IS PERFECTLY LEGAL”

    What about monitoring my child on their phone?  Intercepting and recording the conversations of your children is perfectly legal.  Bishop v. State, 252 555 S.E.2d 504 (Ga. Ct. App. 2001).  In Bishop, the court held that parents have a right, and even a duty, to protect the welfare of their children, which might require call eavesdropping or recording.

    Hot Dog!  I’m set.

    Not quite.  In those other 12 states (including California), both parties to the conversation must consent to the recording of a conversation.  This means that you would have to inform the other party to the conversation that you were making a recording.  In the alternative, you can create a beeping alarm that provides a warning to the caller that the call is being recorded.

    The courts, however, haven’t imposed this strict interpretation of eavesdropping laws on all call intercepts.  The rule of law is that there must be a reasonable expectation that no one else could overhear the conversation, before the courts will assign a privacy right to the call.  Wilkins v. NBC, Inc., 71 Cal. App. 4th 1066 (Cal. Ct. App. 1999).  A call made in a public place is free to be intercepted.

    Realistically, any criminal prosecution for wiretapping would require that the recording of the phone call be made public.

    So, posting the content on the internet, in a newspaper, or even playing the recording for a third party, is probably illegal. This holds true even if there was consent to the recording.  The reason for this is that there is a reasonable expectation that phone calls are private, and by making the content of that call public, it can cause damage to the people who made the phone call.  Every state, except Washington, Montana and South Dakota, has a law prohibiting the publication of telephone communications without consent of all parties.

    In short, using spyphone software is not going to cause you any legal problems, so long as you keep the information you gather to yourself. You should never make the recordings public in any way, or even inform the call participants you have monitored or recorded their phone call. The advantage to using a product like FlexiSPY, is that it is undetectable. So, its installation and use won’t land you in the slammer. Just make sure to keep the details of your monitoring a secret.

  • Use Bitcoin To Buy FlexiSPY And Get A 10% Discount

    Use Bitcoin To Buy FlexiSPY And Get A 10% Discount

    We’d like to let you know that we now accept Bitcoin. Also, if you use Bitcoin to buy FlexiSPY, you will get a 10% discount off your purchase.

    Although paying by Bitcoin is not mainstream yet, there are lots of people who like the idea of using digital currency

    We love disruptive technologies – after all, in our own way, we shook things up just a tad in 2005, when we invented the spyphone.

    So it shouldn’t be a surprise that we now accept Bitcoin as a payment option for FlexiSPY.

    Bitcoin, is a digital currency and a payment system that is not under the control of any country or authority. Existing money systems are controlled by Governments (sometimes), or (more commonly,) private monopolies such as the Federal Reserve. Introduced in 2009 as open source software, its evolution has been marked with controversy.

    For those with political perspective, Bitcoins’ promise is to free people from the control of private institutions or self serving interests that manage the worlds economy. Despite these lofty goals, and the threat it seemingly represents to the world order, Bitcoin has its toe dipped into the waters of the mainstream economy.

    There’s even a Bitcoin ATM in Canada.

    In recognition of the acceptance of Bitcoin, you can now buy FlexiSPY using your bitcoin. Simply contact Live Chat, who will give you a bitcoin address and agree on a rate. As soon as we receive the Bitcoin, we will issue a license to you.

    And, as an added incentive, all Bitcoin purchases get an automatic 10% discount, as do Web Money and wire transfer methods