HomeWTMP — Who touched my phone?
WTMP — Who touched my phone?

WTMP — Who touched my phone?

Everyone
Rating
Unknown
Version
10M+
Installs
4.70
7.0k + Reviews
1
3%
2
1%
3
3%
4
10%
5
83%

Review By AppsWm

WTMP — Who touched my phone?WTMP — Who touched my phone?WTMP — Who touched my phone?WTMP — Who touched my phone?

✨ Learning points

This application presents a unique opportunity to learn about mobile device security and privacy. It serves as a practical example of how seemingly passive devices can be monitored and how user data, even the act of unauthorized access, can be logged. Teaching elements center around understanding digital footprints, user consent, and the implications of granting permissions to apps.

Permission Awareness

The app highlights the importance of understanding app permissions. Discussing this can be an engaging teaching moment about digital literacy and responsible app usage. Consider exploring the Android permission model in detail.

💡 Innovation guidance

The core innovation lies in its proactive approach to security. Instead of simply reacting to breaches, it aims to deter unauthorized access. This concept can inspire discussions on preventative security measures in other contexts. Innovation lessons involve thinking outside the box and anticipating potential threats before they materialize.

  • Thinking Preventatively: How can we design systems that anticipate and prevent security breaches?
  • User-Centric Security: How can security measures be implemented without compromising user experience?

🔎 Discovery paths

Using this application opens discovery paths into ethical hacking and penetration testing (within legal and ethical boundaries). Students can explore how similar techniques are used to identify vulnerabilities in larger systems. Discovery methods include reverse engineering, code analysis, and threat modeling.

Ethical hacking involves using hacking techniques to identify and fix vulnerabilities in a system, with the permission of the system owner.

🌱 Growth moments

Implementing similar security features requires a solid understanding of mobile operating systems and programming languages. Growth strategies involve learning about API usage, background processing, and data storage methods. These moments can encourage students to pursue further studies in computer science and cybersecurity.

  1. Mastering Android SDK.
  2. Learning about background services.
  3. Implementing secure data storage.

🚀 Breakthrough insights

The application's ability to detect unauthorized access relies on system-level monitoring and event logging. This breakthrough insight can lead to understanding how operating systems manage security events and how these events can be leveraged for security purposes. Breakthrough steps involve exploring operating system internals and security frameworks.

Pros:
  • Proactive security measure
  • Simple and easy to use
  • Raises awareness about device security
Cons:
  • Potential privacy concerns
  • Battery consumption
  • Limited functionality in free version

Overall learning value

The application offers significant learning value by demonstrating practical security concepts and inspiring further exploration into mobile security and cybersecurity. It's a valuable tool for teaching digital literacy and responsible technology use.

Description

WTMP Who touched my phone? Application will record those who will use your phone using the front camera in the background mode, invisibly for user. You will see who, when and what did to your favorite device while it is not under your attention. How does it work? ) Open app and click the button. ) User unlocked device or tried to do it. ) Device screen goes out. App saves report. ) User tries to unlock device several times. ) Browse your reports in app. Set up sync with the cloud. This app uses the Device Administrator permission. The application needs device administrator rights to look out for incorrect unlock attempts. Android only detects a password or pattern as incorrect if it has at least digits/characters or pattern dots. Device Administrator needs to be deactivated before app uninstall.

Summary Of User Reviews

Akiya Hotaru
Akiya Hotaru
May 9, 2021
Simple and straight to the point. No fuss, no BS, not even any ads. My one and only gripe, add an option to not save a report or take a photo if the device was unlocked via a fingerprint that the device has saved. That way, I can leave it on all the time and it only generates a report when the passcode is entered or failed both fingerprint and code. Also, maybe add a thing that negates that within a set time frame, say if I'm sleeping I could turn on a separate button for when I go to sleep.
Antione Miller
Antione Miller
January 16, 2023
I've had this app for years... It has caught a couple of, apparently, untrustworthy individuals and unwanted companions in their dirty, low-down, scheming ways. You can't argue you didn't go to certain apps when the logs show every app that was activated. You can't say you don't know the passcode when it shows you opening up the phone with the right one. Pictures do justice. Logs show truth. Nuff said... I just wished it automatically started upon reboot like an older version did. And 2 cameras.
Jim Bonner
Jim Bonner
May 3, 2020
Since other people rarely gain posession of my phone, I've tested the app a few times and it functions as advertised. I've downloaded and I stalled this app as an added layer of security. I recommend that anyone concerned with the security of the data on their phone download this app. Especially if you have nosey friends. You'll at least know who's been messing with your phone. Highly configurable, and very easy to use!