Which phone is the safest for your health. Telephone. How to choose the safest one? Scientists believe that the tissues closest to the body of the phone absorb more energy than those located farther away, and there are ways to help light

Mobile phones are capable of doing much more tasks than a few years ago. However, a significantly expanded range of opportunities also means the emergence of new risks.

As we now use our phones for more tasks (from social media communication to online shopping, banking and web browsing), we all need to take reasonable precautions to protect our phones and our information from malicious attacks.

How to make using your smartphone more secure

  • Lock your phone
    Make sure the screen lock is on to reduce the risk of getting your phone in your hands.
  • Use encryption to keep information important to you
    Check if your phone has a data encryption feature and make sure it is in use. If your phone is stolen, computer criminals will not be able to access the personal information stored on your phone if that information is encrypted.
  • Track application behavior on your phone
    Make sure that resources on the phone are accessed with your permission after being requested by the app. This is especially important for Android smartphones.
  • Protect your phone and your information
    Many users who would not even consider using a laptop, PC, or Mac computer without antivirus software forget that modern smartphones are powerful computers, and they run the same risk. Make sure all devices are running a well-established antivirus program and that the antivirus databases are updated regularly.
  • Be aware of the dangers of gaining root access by jailbreaking
    While it is tempting to gain root privileges in order to gain access to special applications and services, this can significantly reduce its security. To keep your phone and your data safe, do not try to root or jailbreak your phone.
  • Turn off Bluetooth if possible
    If you are not using a Bluetooth connection, it is best to disable it. This way you can make your phone less vulnerable to and reduce battery drain.
  • When choosing an antivirus for your smartphone, make sure it has anti-theft protection.
    Some smartphone security products include a wide range of theft protection features that give the owner remote access to a lost or stolen smartphone so that it can be locked, located, and erased.

According to information posted on the website of the American Cancer Society (ACS), there are very realistic fears that cell phones may increase the risk of brain tumors and other types of tumors in the head and neck area, writes the BBC.

The Specific Absorption Rate (SAR) of electromagnetic energy is used to measure the potential health risks of radiation.
Image: pixabay.com

It is an indicator of the electromagnetic energy that is absorbed in the tissues of the human body when using a mobile device. This varies by phone brand and model, and manufacturers are required to report the maximum SAR level emitted by their product.

The Federal Office for Radiation Protection of the Federal Republic of Germany (BfS) has created a database that compares new and old smartphones to see which ones emit the most.

Here are the smartphones with the strongest radiation:

Image: Statista

As you can see, the first places were taken by Chinese brands such as Xiaomi, OnePlus and Huawei, as well as Lumia 630 from Nokia.

The iPhone 7 is ranked 11th, the iPhone 8 is 13th, and the iPhone 7 Plus is 16th.

Unfortunately, there are no universal recommendations for the "safe" level of mobile radiation, but in Germany, for example, there is a government body Der Blaue Engel ("Blue Angel"), which sets environmental standards and has already established itself as a reliable guide for consumer.

Only mobile phones with a SAR of 0.60 watts per kg are considered safe by this authority.

All phones from the above list have a SAR level twice higher than this indicator, and the Xiaomi M1A1 model with an indicator of 1.75 watts / kg tops the list.

And these are smartphones with the lowest radiation:

Image: Statista

As you can see, the least amount of radiation comes from smartphones such as Sony Experia M5 (0.14), Samsung Galaxy Note 8 (0.17) and S6 edge + (0.22), Google Pixel XL (0.25) Samsung Galaxy S8 (0.26) and S7 edge (0.26).

If you want to check the radiation level of your phone, see the instructions that came with it, or visit the manufacturer's website, or you can visit the FCC website.

How to avoid exposure to radiation?

Image: By Ordercrazy (photo) (Own work) [CC0], via Wikimedia Commons The most powerful radio signal is at the transmitting antenna, which is hidden inside the body of modern smartphones. In this case, the waves lose energy and weaken with distance from the phone.

Most users hold the mobile to their ears while talking, but the closer the antenna is to the head, the higher the expected exposure to radiated energy, according to the ACS.

Scientists believe that tissues closest to the body of the phone absorb more energy than those located further away, and there are ways to help minimize harmful effects:

Image: pixabay.com

1. Reduce the amount of time you spend talking on the phone.

2. Use your phone's speakers or headset to keep your phone away from your head.

3. Position yourself as close to the cell tower as possible: mobile phones are tuned to consume as little energy as possible to get a good signal. The further you are from the mast (or inside a building or place with poor reception), the more power your phone needs to get a good signal.

4. Choose devices with a low SAR.

All mobile phones support voice and text communications. And nowadays, most devices can do much more. Mobile phones have become an integral part of everyday life, largely due to their portability, versatility and relatively low cost. These same qualities make them valuable to human rights defenders, who often use smartphones to exchange sensitive data and store sensitive information, just as they used to do on secure computers.

Our guide is primarily dedicated to smartphones, devices on Android and iOS with mobile communication functions, with the possibility of voice and text communications, often with access to the Internet. The list of smartphone features is constantly growing: cameras, digital storage, motion sensors, geosteering receivers (GPS), wi-fi, easy access to a varied collection of applications. A large portion of this guide can be applied to other mobile devices as well, such as feature phones (regular old-fashioned mobile devices) and tablets. The latter are often large smartphones with increased power, although they do not support mobile functions.

What you will learn from this guide

  • Critical data is becoming more portable - how to deal with the risks
  • Why mobile voice and text communications are particularly vulnerable to surveillance
  • What steps should you take to improve the security of your smartphone when transferring and storing data, taking photos, visiting websites, etc.
  • How to improve your chances of staying anonymous (if needed)

General information about mobile phones

Smartphones are one of the most powerful technologies available to most people. These devices are crammed with different sensors, are almost always at hand, usually connected to one network or another. All in all, there are most of the security threats that we usually associate with computers, plus a whole host of additional problems arising from portability, versatility, insecure network architecture, location tracking, image capture, etc.

Operating Systems

Most smartphones run on two operating systems: Google Android and Apple iOS... All kinds of companies sell Android devices. Their software "filling" is often changed by developers and service providers. They hope and sometimes demand that device owners work in them mobile networks (and paid, of course). The iOS operating system only works on Apple devices. It seriously complicates the launch of applications that have not been approved Apple.

One of the main factors affecting the security of an Android smartphone is regular updates to the operating system. Some cheap models do not have access to updates, so serious security bugs cannot be fixed there. This can leave you vulnerable to malicious code and a variety of attacks.

Branded and locked smartphones

Smartphones are often sold locked. This means that the device can only work in the network of a particular telecom operator. (Only with this operator's SIM card). The operator frequently changes the operating system and installs additional applications on the locked phone. In addition, the operator can disable some functions. The result is applications that cannot be removed or denied access to data, including your contacts and stored information.

Therefore, it is safer to buy an ordinary, unlocked smartphone, without being tied to a telecom operator. Unfortunately, these smartphones are usually more expensive.

Basic security settings

A smartphone has many settings with which you can control the security of the device. It is important to know these settings. You can read more about some Android settings and apps in this guide:

Install, check and update applications

The easiest (and usually the safest) way to install the app on your smartphone is to use Google Play for Android or App Store for iOS. Log into your account on the device - and you can download and install applications.

Android apps are available online in many places, but our "default" advice is not to install apps from anywhere. Some of them contain malicious code. For more information on malware, see our guide on How to protect devices from viruses and phishing. Only install apps from sources you trust. Keep in mind that trusted individuals can inadvertently distribute malicious code without knowing it. Apps on Google Play and the App Store are subject to some verification by Google and Apple respectively. This provides some protection against overtly malicious applications.

There is also a solution for advanced Android users - or those who don't want or cannot use Google Play. it F-Droid , an alternative selection of programs in which only FOSS -applications. If you need access to F-Droid, you can install the corresponding application from a trusted sourceand then use it to install other applications. You can also install applications directly from files .apk (android packages)if you enable the function installation of unknown applications... Yes, it's risky, but if you have no other way to install the application you want, you can ask someone you trust to give you .apk-file on the memory card.

Even "official" applications sometimes behave badly. On Android devices, each application asks for permission to perform certain actions. You should pay attention to exactly what permissions the programs are asking for. If this is something illogical, clarify the reasons and consider not granting permission and removing the application. If you wanted to install a news reader application, and it asks to allow it to send your contacts over the network to a third party, there is reason for concern. (Some developers collect contact lists for sale or self-use for marketing purposes.)

Try to keep your apps up to date and uninstall those you don't use. A developer can sell his creation to other people, and they will modify the application that you already have installed and add malicious code to it.

Data mobility and vulnerability

The mobile phones that we carry with us everywhere often contain important information. Call history, browsing history in the browser, text and voice messages, address books, calendars, photos and other useful things can lead to a chain of troubles if the device on which they were stored is lost or stolen. You need to know where important information is located on your mobile phone, as well as online data that is automatically accessible. This data can fuel a threat against not only the owner of the device, but also anyone who ends up in the address book, in incoming messages or in the photo album.

So, you have considered the possible risks and familiarized yourself with the security and privacy features of your device. It's time to start taking protective measures.

We store information on a smartphone

Modern smartphones have a lot of storage space. It may be easy for someone with physical access to the device to retrieve this information. (Of course, this depends on the device itself).

Encrypt the device and data on it

On modern iOS devices, strong encryption is enabled by default (of course, you must set a strong password). Android also supports device encryption, and you can usually turn it on. Remember to back up your smartphone data before encrypting the entire device. This will come in handy if there is any problem during the encryption process.

Android also allows you to encrypt data on memory cards (for example, microSD) if you use them.

When you turn on the encrypted phone and enter the password, you get access to read and change data on the device. Anyone who has physical access to your phone when it's turned on and unlocked can get to your data. For more confidence - for example, before crossing a border or going through security at an airport - it is best to turn off the device completely.

Of course, there are not only pros but also cons. For example, if you think you might need to make an urgent call, it might be best to leave your phone on and just lock the screen.

If you can't completely encrypt your device (or you need additional security for individual files), try installing an encryption app. Some applications encrypt their own data, and, for example, OpenKeychain allows you to encrypt third-party files. Using this app together with the program K-9 Mail , you can send and receive encrypted emails. (There are no analogues to this on iOS). Apps like these can help protect valuable information, but you should still consider encrypting your device.

It makes sense to minimize the amount of valuable data you store on your device, especially if it is not encrypted. Some phones have a function that allows you not to store the history of calls and SMS messages. You can get in the habit of deleting important data from your call and message history.

Safe storage of passwords

Passwords can be stored in a single encrypted file if you install the KeePassDroid FOSS application. This application is the only one, but very reliable master password used to protect all other passwords. Those, in turn, can be very long and unique for all accounts, and you do not need to remember them. KeePassDroid has a built-in password generator that is useful when creating new accounts.

If you are using KeePassXC or KeePassX on your computer, as described in the tutorial on creating and storing strong passwords, you can copy your base (file .kdbx) to your mobile device.

There is a similar app for iOS called MiniKeePass.

The first step to protect information on a mobile phone: restrict access to the device. You should keep it on at all times, except in situations where there are special risks. This applies to both SIM cards and memory cards. Even if you fear viruses or advanced surveillance, it may be safer not to leave your device unattended, but to remove the battery and keep your smartphone with you.

So, turn on encryption and keep your smartphone with you. What else can you do to physically secure your mobile device and mitigate damage if it is lost or stolen?

Basic steps

    Always use a reliable screen lock code and try not to give it to anyone. If you have a simple phone with a default code, change the code.

    You should not keep important information, including phone numbers, on the SIM card, because they cannot be encrypted there.

    Back up important phone data periodically. Save them to a computer or external media. Keep your backups in a safe place as we discussed in the chapter on protect important files on your computer ... If you have a backup, it's easier to remember what information was on the phone and, if necessary, return to factory settings.

    Phone numbers are often tied to important accounts. An attacker may need your phone to gain access to these accounts or to impersonate you. Some mobile operators allow customers to protect their account with a PIN or password so that no one else can make changes to their account or steal their phone number. If available, please use it.

    Worried about malicious code? It might make sense for a small sticker to temporarily cover the phone's camera.

About loss and theft

    Mobile devices have a 15-digit International Mobile Equipment Identity (IMEI). This code allows you to identify the device on the network. Changing the SIM card does not change the IMEI. The code is often written underneath a removable battery. Most phones will show IMEI in settings and / or upon request * # 06 #. Make a note of the IMEI. It can help you prove that you are indeed the owner of the stolen phone.

    Think about the pros and cons of registering your phone with a carrier. If you report a missing phone, your carrier usually has the option to turn off the phone. However, registering the device further ties your identity to your phone.

    Most Android phones and iPhones have a Find My Phone feature built in. It allows you to track or disable the device in case of theft. There are independent software developments for the same purpose. These tools involve a trade-off, but if you trust the owner of the service and their programs, you can try this option.

What to do if you need to transfer the device to another person

    When you throw away an unwanted phone, give or sell it to someone, make sure that it does not contain information that is usually stored on a SIM or memory card. This advice is relevant, even if the device has not turned on for a long time or does not work at all. You can get rid of a SIM card by physically destroying it. Remove the memory card from the device and either destroy it or store it securely. The best way to protect data on your phone is to make sure it is encrypted and then reset the device to factory defaults.

    Only use stores and repair shops that you trust. This will reduce the vulnerability of your data when you buy a used device or take your device for repair. If you think someone might have the resources, access, or motivation to stalk you and install malicious code to that end (before you buy your phone), try randomly choosing one of the authorized dealers.

    If you are sending your phone for repair, remove the SIM card and memory card.

Mobile infrastructure, surveillance and eavesdropping

Mobile phones and cellular networks are even less secure than commonly believed. To send and receive voice and text messages, your phone is constantly in touch with the nearest cell tower... This way the carrier knows - and records - the location of the phone when it is turned on.

Interception of calls and text messages

Mobile networks are usually privately owned by commercial companies. Sometimes the entire infrastructure of a mobile network is owned by the carrier itself. It happens that an operator resells a mobile connection that it leases from another company. SMS text messages are not encrypted. Voice communication is not encrypted or weakly encrypted. Both types of communication are not protected from control within the network itself. As a result, both your carrier and the cell tower owner have unlimited access to your calls, text messages, and location data. The government also gains this access in many cases, even when it does not own the infrastructure itself.

Many countries have laws and regulations that require telecom operators to record and store customer SMS messages. Most of the operators, however, do this for the sake of their business tasks, reporting and resolving possible conflicts. In some countries, similar rules apply to voice communications.

Moreover, the operating system that is installed on the mobile phone may well have been originally designed or changed for a particular telecom operator. Accordingly, the operating system itself may contain hidden functions that make monitoring even more penetrating. This applies to both simple mobile phones and smartphones.

A third party can also sometimes intercept voice and text communications. For example, an attacker could use an inexpensive device called iMSI catcher... If such a device is placed in the reception area of \u200b\u200ba mobile phone, it can take the "catcher" for a real cell tower. (Sometimes "IMSI catchers" are called stingrays - the name known by experts under which these devices are positioned on the market for the needs of law enforcement agencies). In several cases, third parties have even been able to access mobile network resources from the other side of the globe. They exploited vulnerabilities in alarm system 7 (Signaling System Number 7, SS7), a set of protocols for international exchange of voice and SMS messages.

Finally, even if you connect to the Internet via wi-fi rather than cellular, operating systems on smartphones and tablets encourage users to share their personal data on social networks and cloud storage; people are encouraged to actively use global geosteering (GPS) and other similar functions. Many Android and iOS lovers like it, and personal data have a better chance of "leaking" to the network.

Want to protect your most important messages in transit? First, ask yourself a few questions:

  • With whom, when and how often do you communicate?
  • Who else might be interested in information that you are communicating with this person?
  • How sure are you that your interlocutor is who he claims to be?
  • What is the content of your calls and messages?
  • Who else might be interested in this content?
  • Where do you get in touch from, where is your interlocutor?

If the answers to these questions cause you security concerns, you should consider how to minimize the associated risks. To do this, you may have to help the interlocutor with the development of a new technology or program. In some situations, it is probably best to ditch the mobile phone as a communication medium.

Anonymity

Protecting the content of calls and messages can be challenging. It is even more difficult to remain anonymous when using a mobile phone. In particular, it is rarely possible to hide the fact that you are communicating with a certain person when you make a call or send an SMS. You can use a secure messenger with an internet connection via a mobile network or wi-fi, but how can you guarantee success? Most often, the maximum that can be done is to choose which one third parties will be able to access the information, and hope that this party will not work closely with those from whom you want to protect your communication.

To increase the level of anonymity, people sometimes prefer disposable phones and short-term accounts. It works in some situations, but getting things right is not easy. The simplest choice for both sides of the process is to buy prepaid phones, use them for voice calls and SMS messages for a very short time, then destroy them. The data, however, cannot be encrypted. The effectiveness of this method depends on a rather long list of conditions. Here are some:

  • Both parties buy phones and SIM cards with cash.
  • When they do this, no one is tracking them. real phones.
  • They activate SIM cards without showing any documents.
  • They pull batteries out of phones when not in use.
  • They can exchange phone numbers without attracting too much attention.
  • They use their phones in places where they usually don't spend time.
  • When they go to places where they usually spend time, they do not take their phones there.
  • Voice recognition technologies keep up with our expectations.

If all of the above conditions are met for a prepaid smartphone, you can try to hide the connection between the two parties by making encrypted calls. But doing it really effectively requires even more care and attention, in part because smartphones and secure communication apps require account registration. It makes little sense to use an "undetectable" phone to access services that are already associated with your identity. You can create anonymous e-mail accounts and "one-time" accounts in other services, but this takes time and requires concentration. Both parties need to understand what IP addresses are, browser fingerprints, how to use the Tor Browser or Tails, to name a few. They will have to spend additional time and money on randomly selected Internet cafes without using real phones.

Listening

The phone can be configured to store or transmit data received from a microphone, camera or GPS receiver - and the owner will not know about it (this applies to both a simple mobile phone and a smartphone). Most of these attacks are due to malware, but it cannot be ruled out that telecom operators may be involved in similar surveillance of devices connected to their networks. Some phones can even be remotely turned on and made to spy on their owners, although they appear to be turned off.

    If you don't trust the person, don't give them access to your phone. (Violation of this rule is a common reason malware gets onto our devices.)

    Please note: Using a mobile phone in public or in a location you believe might be monitored leaves you vulnerable to traditional eavesdropping. In addition, the risk of phone theft increases.

    Configure those with whom you communicate on important issues, start using the same programs and techniques that you use yourself.

    Hosting a private, personal meeting? Disconnect the phone, remove the battery. Not to reveal a place meetings, it's best to do this before you go to the meeting. If you can't remove the battery, just leave your phone somewhere safe.

Internet by mobile phone

Signal's user ID (for simplicity) is a mobile phone number. Unfortunately, this means that you won't be able to use Signal without a valid mobile phone number, even if you prefer wi-fi. In addition, if you want to contact someone via Signal, you will have to give that person your phone number. Those for whom this is a problem can pay attention to other messengers with a "good reputation", for example, Wire (Android, iOS).

Answers to the following questions will help you choose a mobile messenger:

  • What do digital security experts say about him?
  • Is it free software? Open source?
  • Does it support end-to-end encryption for two users to communicate?
  • Does it support end-to-end encryption in group text chat?
  • Does it support end-to-end encryption in group voice communication?
  • Does end-to-end encryption protect files in transit?
  • Can messages be configured to "self-destruct after read"?
  • Will the program work on a slow internet connection?
  • Who is the developer of the application, should you trust him?
  • Who is the owner of the server, what is its policy regarding the storage of calls and messages?
  • Can you use one account on multiple devices?
  • Are all major operating systems supported?
  • Can I use my email address and username for registration, rather than a phone number (which will separate your account from your real identity)?
  • Can you use the messenger without giving him access to contacts on the device?
  • Can I use it on a mobile device but not on a phone?
  • Can you (or someone you trust) run your own server and communicate through it?

Sending and receiving e-mail on a smartphone

Looking to read important email on your mobile device? Make sure encryption is turned on, as discussed in the Android security basics. (In recent iPhones, encryption is enabled by default, it is only important to choose a strong password.) This will not protect your mail all the way to the addressee, but it will prevent someone who tries to read it after the loss / theft of a mobile device. You may find guidance on how to keep your communications private.

This guide deals in particular with GPG -Email encryption on Windows, Mac and Linux computers. It is also possible to send and receive encrypted mail on Android devices, but not without difficulty. (There is currently no free GPG encryption for iOS.)

Most security experts advise against storing your secret encryption key anywhere other than your primary work computer. (Moreover, do not carry the key with you). However, you will need this key to read encrypted messages on your mobile device. Android devices are safer today than they once were, and your private key is protected by a strong password. Thus, if you really necessary to send and receive such important data on an Android device, and the transition to a secure messenger does not suit you, you can install GPG on it.

For this you need:

  1. Install and configure GPG and a key management application, for example OpenKeychain .
  2. Copy your private key to the device.
  3. Install and configure an email application that works with OpenKeychain, eg, K-9 Mail .

Not just calls and messages

Mobile phones are multifunctional devices, small computers with their own operating systems, downloadable applications. Mobile phones provide a variety of services. Much of what you do on your computer, you can do on your smartphone today. And, of course, there are many things you can do on your smartphone, but not on your computer.

Browsing websites

The simplest mobile phones cannot connect to the Internet, but these are rarely seen these days. If you are using a browser on your Android device to go to sites with restricted access, consider using a virtual private network (VPN) or the app Orbot (Android versions of Tor Browser).

VPN on Android device

VPN creates an encrypted tunnel from your device to a VPN server somewhere on the internet. VPN helps protect outbound and inbound traffic. This is especially important if traffic is passing through an insecure local or national network. However, since all traffic goes through the VPN provider, it can see everything that is no longer available for viewing from the local network or Internet access provider. It's important to choose a VPN service you trust and remember to use HTTPS when transferring valuable data.

VPNs are illegal or restricted in some countries. Find out the situation in the country where you intend to use the VPN. Remember that a VPN does not hide the fact that you are using a VPN.

To use a VPN, you need to install a client application and create an account with a VPN provider. Riseup Team offers a free open source VPN client for Android called Bitmask and supports the free VPN service Riseup Black. (If you already have a Riseup Red account and know how to manually set up a VPN, you can use the app OpenVPN for Android (Play Store, F-Droid) with your username and password Riseup Red... (Application OpenVPN for Android free and open source).

Tor on an Android device

To access sites anonymously, you can use a couple of Android apps: Orbot and Orfox ... Orbot routes internet traffic through the Tor anonymous network. Orfox is a mobile version of Firefox that uses Orbot and provides additional protection for your privacy. Together, these two applications allow you to bypass online filters and visit websites anonymously, the same as Tor Browser for Windows, Mac and Linux.

You can learn more about anonymity and circumvention of censorship in the related guide.

Photo and recording

Smartphones allow you to take photos, record sound, shoot videos. These are all powerful tools for documenting events and disseminating information about them. The privacy and safety of those who appear on camera and on the recording must be respected. For example, if you recorded an important event, and then the phone fell into the wrong hands, this can lead to trouble for both you and the heroes of your report. Some tips on what to do to manage these risks:

  • Consider how you can safely and quickly upload recorded files to the network and delete them from your device.
  • Use tools to blur the faces of people who appear in your photos and videos, as well as distort the voices of those you record.
  • Find out which programs and settings to get rid of metadata in media files. Examples of such metadata are the GPS coordinates of the places where the photos were taken, the parameters of the camera that was used for shooting.

The Guardian Project has created and maintains a free open source application called ObscuraCam that works with photos and videos: blurs faces and removes metadata.

if you necessary save faces, voices and metadata, then it is especially important that your device is encrypted. Files that you copy from your device elsewhere for storage or transfer must also be encrypted. Driven by this idea, programmers Guardian project developed the Proof Mode application, the antipode ObscuraCam. Proof Mode "pulls" from the material as much metadata as possible, which can help to establish the authenticity of the image or video. This metadata is stored separately from associated images and videos; only transmit them over secure channels.

  • Connect your phone to your computer only if you are sure that there is no malicious code on your computer. For more information, see our guide to protecting your computer from viruses and phishing.
  • As with a computer, be careful when connecting to a wi-fi network without a password.
  • Turn off wi-fi, Bluetooth, and Near Field Communication (NFC) when not using these features. Enable them only when necessary and only to connect to trusted networks and devices. Use a cable for data transmission whenever possible.
  • by The Intercept

The smartphone is next to us almost every minute. This versatile device is constantly sending and receiving signals because it uses radio frequency electromagnetic fields to transmit data on the mobile network.

Bild journalists conducted a study and found out when radiation is put dangerous for humans, as well as which mobile devices have the greatest and least radiation.

In 2016, American researchers discovered a link between cell phone radiation and the occurrence of such a dangerous disease as cancer. During the study, rats were exposed to electromagnetic waves for several years, which caused the development of brain and heart tumors.

What is SAR?

The Federal Office for Radiation Protection has been studying radiation from cell phones and smartphones since 2002. The so-called SAR (Electromagnetic Absorption Rate) value is expressed in watts per kilogram (W / kg).

When is radiation dangerous?

A device with a SAR of 0.6 W / kg is considered harmless according to the Federal Radiation Protection Agency. The World Health Organization considers a mobile device to be dangerous when the SAR value exceeds 2.

What kind of radiation does the iPhone have?

Apple mobile phones: iPhone 7 (1.48 W / kg) is ranked 10th. Its brothers the iPhone 8 (1.32 W / kg) and iPhone 7 Plus (1.24 W / kg) are less harmful. Apple devices were not included in the rating of smartphones with the lowest radiation.

How can you protect yourself?

Use a headset or speakerphone. Do not hold your smartphone to your ear.

Pause background data refresh to prevent your device from working unnecessarily at night.

Use Wi-Fi if possible.

These smartphones have the highest SAR values

5th place: Huawei P9 Plus with 1.48 W / kg


4th place: Nokia Lumia 630 with 1.51 W / kg


3rd place: Huawei Mate 9 with 1.64 W / kg


2nd place: OnePlus 5T with 1.68 W / kg


1st place: Xiaomi Mi A1 with 1.75 W / kg


These smartphones have the lowest SAR values


Useful Tips

The vast majority of people have a smartphone at arm's length for days on end.

At work, he is in our pocket or next to him on the table, on the way home in transport he is in our hand, and before going to bed he goes to the bedside table. Due to his constant closeness to us, many people have a very reasonable question: is there any risk to health in the long term?

Despite the fact that no serious research has been carried out on the long-term effect of radio emission from a phone on the human body, there are still smartphones that emit the maximum amount of ultrashort waves when pressed against the ear.

Phone harm

It is important to add that there is no standard for safe radiation from a mobile phone. At the same time, the certification of the German company for environmental friendliness "Der Blaue Engel" is issued only to those smartphones, the specific absorption coefficient of which is lower than 0.60 W / kg.

So, we are listing smartphone models that have doubled this figure or more. The SAR is indicated next to the phone model when you hold the mobile phone to your ear.

Let's start from the end, with the strongest smartphones in terms of radiation.

Damage to mobile phones

1. OnePlus 5T - 1.68 W / kg



2. Huawei Mate 9 - 1.64 W / kg



3. Nokia Lumia 630 - 1.51 W / kg



4. Huawei P9 Plus - 1.48 W / kg



5.Huawei GX8 - 1.44 W / kg



6. Huawei P9 - 1.43 W / kg



7. Huawei Nova Plus - 1.41 W / kg



8. OnePlus 5 - 1.39 W / kg



9.Huawei P9 lite - 1.38 W / kg



10. iPhone 7 - 1.38 W / kg



11. Sony Xperia XZ1 Compact - 1.36 W / kg


12. iPhone 8 - 1.32 W / kg



13.ZTE AXON 7 mini - 1.29 W / kg



14. BlackBerry DTEK60 - 1.28 W / kg



15. iPhone 7 Plus - 1.24 W / kg



Now let's share with you some more facts about the dangers of gadgets.

1. Many people think, what is the harm of a mobile phone? After all, manufacturers claim that the level of radio emission is so small that it cannot adversely affect human health.

In reality, this is not the case. At the state level, sanitary inspections were repeatedly carried out, which scientifically confirmed the fact that modern mobile phones are not safe, they can affect the human heart, brain and reproductive system around the clock, because harm is done not only during a conversation, but at any time. when the phone just lies on.