The safest cell phones in terms of radiation. What is the SAR level in a phone? Branded and locked smartphones


All mobile phones support voice and text communication. And these days, most devices can do much more. Mobile phones have become an integral part of everyday life, largely due to their portability, versatility and relatively low cost. The same qualities make them valuable to human rights defenders, who often use smartphones to share sensitive data and store sensitive information in ways that were previously common on secure computers.

Our guide is primarily dedicated to smartphones, devices Android And iOS with mobile communication functions, with the possibility of voice and text communications, often with Internet access. The list of smartphone functions is constantly growing: cameras, digital data storage, motion sensors, geo-navigation receivers (GPS), wi-fi, easy access to a motley collection of applications. A significant portion of this guide may also apply to other mobile devices, e.g. feature phones(regular old-fashioned mobile devices) and tablets. The latter are often large, high-power smartphones, although they do not support mobile communications functions.

What will you learn from this guide?

  • Important data is becoming more portable - what to do about the risks
  • Why mobile voice and text communications are especially vulnerable to surveillance
  • What steps should you take to improve the security of your smartphone when transferring and storing data, taking photographs, visiting websites, etc.
  • How to increase your chances of remaining anonymous (if necessary)

General information about mobile phones

Smartphones are one of the most powerful technologies available to most people. These devices are stuffed with various sensors, are almost always at hand, and are usually connected to one or another network. In general, there are most of the security threats we typically associate with computers, plus a whole host of additional issues that arise from portability, feature-richness, insecure network architecture, location tracking, image capture, and so on.

OS

Most smartphones run on two operating systems: Google Android and Apple iOS. A variety of companies sell Android devices. Their software is often changed by developers and service providers. They hope, and sometimes demand, that device owners work in their mobile networks (and paid, of course). The iOS operating system only works on Apple devices. It seriously makes it difficult to launch applications that have not been approved Apple.

One of the main factors affecting the security of an Android smartphone is regular operating system updates. Some cheaper models don't have access to updates, so they can't fix serious security bugs. This can leave you vulnerable to malicious code and a variety of attacks.

Branded and locked smartphones

Smartphones are often sold locked. This means that the device can only work in the network of a specific telecom operator. (Only with a SIM card from this operator). The operator often changes the operating system and installs additional applications on a locked phone. In addition, the operator can disable some functions. The result is apps that cannot be removed or denied access to data, including your contacts and stored information.

Therefore, it is safer to buy a regular, unlocked smartphone, without being tied to a telecom operator. Unfortunately, such smartphones are usually more expensive.

Basic Security Settings

Your smartphone has many settings that you can use to control the security of your device. It is important to know these settings. You can read more about some Android settings and apps in this guide:

Installing, checking and updating applications

The simplest (and usually safest) way to install an application on a smartphone is to use Google Play for Android or App Store for iOS. Log in to your account on the device - and you can download and install applications.

Android apps are available online in many places, but our "default" advice is to not install apps from anywhere. Some of them contain malicious code. You can read more about malware in the guide on how to protect your devices from viruses and phishing. Install applications only from sources you trust. Be aware that trusted individuals may unintentionally distribute malicious code without knowing it. Apps on Google Play and the App Store are subject to some review by Google and Apple, respectively. This provides some protection against outright malicious applications.

There's also a solution for experienced Android users - or those who don't want or can't use Google Play. This F-Droid, an alternative selection of programs that only contains FOSS-applications. If you need access to F-Droid, you can install the corresponding application from a trusted source and then use it to install other applications. You can also install applications directly from files .apk (Android packages), if you enable the function installing unknown applications. Yes, it's risky, but if you have no other way to install the app you want, you can ask someone you trust to give you .apk-file on the memory card.

Even "official" apps behave badly sometimes. On Android devices, each application asks permission to perform certain actions. You should pay attention to exactly what permissions programs ask for. If it's something illogical, check the reasons and consider not giving permission and deleting the app. If you wanted to install a news reader app and it asks you to allow it to send your contacts over the network to a third party, there is cause for concern. (Some developers collect contact lists for sale or self-use for marketing purposes.)

Try to update apps promptly and remove those you don't use. The developer can sell his creation to other people, and they will modify the application that you already have installed and add malicious code to it.

Mobility and data vulnerability

The mobile phones we carry with us everywhere often contain important information. Call history, browser browsing history, text and voice messages, address books, calendars, photos and other useful things can lead to a chain of troubles if the device on which they were stored is lost or stolen. You need to know where important information is located on your mobile phone, as well as online data that you can automatically access. This data can fuel a threat against not only the owner of the device, but also everyone who ends up in the address book, in incoming messages or in a photo album.

So you've thought through the risks and become familiar with the security and privacy features of your device. It's time to start taking protective measures.

We store information on a smartphone

Modern smartphones have a lot of storage space. It may be easy for someone with physical access to the device to retrieve this information. (Of course, this also depends on the device itself).

Encrypting the device and data on it

Modern iOS devices have strong encryption enabled by default (of course, you must set a strong password). Android also supports device encryption, and you can usually turn it on. Don't forget to back up your smartphone data before encrypting the entire device. This will come in handy if any problem arises during the encryption process.

Android also allows you to encrypt data on memory cards (for example, microSD), if you use them.

When you turn on an encrypted phone and enter the password, you gain access to read and change data on the device. Anyone with physical access to your phone when it's turned on and unlocked can get to your data. To be more confident - for example, before crossing a border or going through airport security - it is better to turn off the device completely.

Of course, there are not only pros, but also cons. For example, if you think you might need to make an urgent call, it might be better to leave your phone on and simply lock the screen.

If you can't completely encrypt your device (or need extra security for individual files), try installing an encryption app. Some applications encrypt their own data, and, for example, OpenKeychain allows you to encrypt third-party files. Using this application together with the program K-9 Mail, you can send and receive encrypted messages. (There are no analogues to this on iOS). Apps like these can help protect valuable information, but you should still consider encrypting your device.

It makes sense to minimize the amount of valuable data you store on your device, especially if it's not encrypted. Some phones have a feature that allows you not to store the history of calls and SMS messages. You can get into the habit of deleting important data from your call and message history.

Secure password storage

Passwords can be stored in a single encrypted file if you install the FOSS application KeePassDroid. The only one in this application, but very reliable master password used for protection all others passwords. Those, in turn, can be very long and unique for all accounts, and there is no need to remember them. KeePassDroid has a built-in password generator, which is convenient to use when creating new accounts.

If you use KeePassXC or KeePassX on your computer, as described in the guide on creating and storing strong passwords, you can copy your database (file .kdbx) to a mobile device.

There is a similar app for iOS called MiniKeePass.

The first step to protecting information on your mobile phone is to restrict access to the device. You should keep it on at all times, except in situations where there are special risks. This applies to both SIM cards and memory cards. Even if you are wary of viruses or advanced surveillance, it may be safer to remove the battery and keep the smartphone with you instead of leaving your device unattended.

So, enable encryption and keep your smartphone with you. What else can you do to physically secure your mobile device and reduce damage if it is lost or stolen?

Basic Steps

    Always use a strong screen lock code and try not to give it to anyone. If you have a simple phone with a default code, change the code.

    You should not store important information, including phone numbers, on a SIM card because they cannot be encrypted there.

    Back up important phone data periodically. Save them to your computer or external storage device. Keep backups in a safe place, as we discussed in the chapter on protecting important files on your computer. If you have a backup, it's easier to remember what information was on your phone and, if necessary, return to factory settings.

    Phone numbers are often tied to important accounts. An attacker may need your phone to gain access to these accounts or to impersonate you. Some mobile operators allow the client to protect their account with a PIN code or password to prevent anyone from making changes to the account or stealing the phone number. If such a feature is available, use it.

    Worried about malicious code? It might make sense to have a small sticker that temporarily covers your phone's camera.

About loss and theft

    Mobile devices have a 15-digit International Mobile Equipment Identity (IMEI). This code allows you to identify the device on the network. Changing the SIM card does not change the IMEI. The code is often written underneath the removable battery. Most phones will show the IMEI in settings and/or when prompted for *#06# . Write down the IMEI. He can help you prove that you are indeed the owner of the stolen phone.

    Think about the pros and cons of registering your phone with a carrier. If you report your phone missing, your carrier usually has the ability to disconnect the phone. However, registering your device further ties your identity to your phone.

    Most Android phones and iPhones have a built-in Find My Phone feature. It allows you to track or disable the device in case of theft. There are independent software developments for the same purpose. Tools like this come with a trade-off, but if you trust the service owner and his software, you can try this option.

What to do if you need to transfer the device to another person

    When you throw away your unwanted phone, give it away or sell it to someone, make sure it doesn't contain information that would normally be stored on a SIM card or memory card. This advice is relevant even if the device has not been turned on for a long time or does not work at all. You can get rid of a SIM card by physically destroying it. Remove the memory card from the device and either destroy it or store it securely. The best way to protect the data on your phone is to make sure it is encrypted and then reset the device to factory settings.

    Use only shops and repair shops you trust. This will reduce the vulnerability of your data when you buy a used device or take your device in for repair. If you think someone might have the resources, access or motivation to harass you and install malicious code for this purpose (before you buy the phone), try randomly selecting one of the authorized dealers.

    If you send your phone for repair, remove the SIM card and memory card.

Mobile infrastructure, surveillance and eavesdropping

Mobile phones and cellular networks are even less secure than commonly believed. To send and receive voice and text messages, your phone is always in touch with the nearest cell tower. This way the carrier knows - and records - the location of the phone when it is turned on.

Interception of calls and text messages

Mobile networks are usually privately owned by commercial companies. Sometimes the entire mobile network infrastructure belongs to the telecom operator itself. It happens that the operator resells mobile communications that it rents from another company. SMS text messages are not encrypted. Voice communications are not encrypted or are only weakly encrypted. Both types of communications are not protected from control within the network itself. As a result, both your carrier and the cell tower owner have unlimited access to your calls, text messages, and location data. The government, in many cases, also gains this access, even when it does not own the infrastructure itself.

Many countries have laws and regulations that require telecom operators to record and store customers' SMS messages. Most operators, however, do this anyway for the sake of their business objectives, reporting and resolving possible conflicts. Some countries have similar rules for voice communications.

Moreover, the operating system that is installed on a mobile phone may well have been originally designed or modified for a specific telecom operator. Accordingly, the operating system itself may contain hidden functions that make monitoring even more penetrating. This applies to both simple mobile phones and smartphones.

Third parties may also sometimes intercept voice and text communications. For example, an attacker could use an inexpensive device called catcher IMSI. If such a device is placed in the reception area of ​​a mobile phone, it may mistake the “catcher” for a real cell phone tower. (Sometimes "IMSI catchers" are called Stingrays- a name known among experts, under which these devices are positioned on the market for the needs of law enforcement agencies). In several cases, third parties have even managed to gain access to mobile network resources while being on the other side of the globe. They exploited vulnerabilities in alarm system 7 (Signalling System Number 7, SS7), a set of protocols for the international exchange of voice and SMS messages.

Finally, even if you connect to the Internet via Wi-Fi rather than cellular, operating systems on smartphones and tablets encourage users to share their personal data on social networks and cloud storage; people are encouraged to actively use global geonavigation (GPS) and other similar functions. Many Android and iOS fans like this, and personal data has a greater chance of being leaked online.

Want to protect your most important communications? To get started, ask yourself a few questions:

  • With whom, when and how often do you communicate?
  • Who else might be interested in knowing that you are communicating with this person?
  • How confident are you that your interlocutor is who he says he is?
  • What is the content of your calls and messages?
  • Who else might be interested in this content?
  • Where do you get in touch from, where is your interlocutor located?

If the answers to these questions give you security concerns, you should consider minimizing the risks involved. To do this, you may have to help your interlocutor master a new technology or program. In some situations, it may be better to avoid using your cell phone as a means of communication.

Anonymity

Protecting the content of calls and messages can be challenging. It is even more difficult to remain anonymous when using a mobile phone. In particular, it is rarely possible to hide the fact that you are communicating with a specific person when you make a call or send an SMS. You can use a secure messenger with an Internet connection via a mobile network or Wi-Fi, but how can you guarantee success? Most often, the most you can do is choose which exactly from a third party will be able to access the information, and hope that this party will not closely cooperate with those from whom you want to protect your communications.

To increase the level of anonymity, people sometimes prefer burner phones and short-term accounts. This works in some situations, but getting everything right is not that easy. The simplest choice for both sides of the process is to buy prepaid phones, use them for voice calls and SMS messages for a very short time, then destroy them. However, the data cannot be encrypted. The effectiveness of this method depends on a fairly long list of conditions. Here are some:

  • Both parties buy phones and SIM cards in cash.
  • When they do this, no one tracks them by hereby phones.
  • They activate SIM cards without presenting documents.
  • They remove batteries from phones when they are not in use.
  • They can exchange phone numbers without attracting too much attention.
  • They use their phones in places where they don't usually spend time.
  • When they go to places where they usually spend time, they don't take their phones there.
  • Voice recognition technologies are not exceeding our expectations.

If all of the above conditions for a prepaid smartphone are met, you can try to hide the connection between the two parties by making encrypted calls. But to do this effectively requires even more care and attention, in part because smartphones and secure data sharing apps require account registration. There's little point in using an "undetectable" phone to access services that are already tied to your identity. You can create anonymous email accounts and “disposable” accounts in other services, but this takes time and requires concentration. Both parties need to understand what IP addresses are, browser fingerprints, how to use Tor Browser or Tails, to name a few. They will have to spend extra time and money at randomly selected internet cafes without using actual phones.

Listening

The phone can be configured to store or transmit data received from a microphone, camera or GPS receiver - and the owner will not know about it (applies to both a simple mobile phone and a smartphone). Most of these attacks involve malware, but it cannot be ruled out that telecom operators may be involved in similar surveillance of devices connected to their networks. Some phones can even be turned on remotely and made to spy on their owners, although they will appear to be turned off.

    If you don't trust the person, don't give them access to your phone. (Breaking this rule is a common reason why malware gets onto our devices.)

    Please note: Using a mobile phone in public or in a place that you believe may be under surveillance makes you vulnerable to traditional eavesdropping techniques. In addition, the risk of your phone being stolen increases.

    Encourage those with whom you communicate on important issues to start using the same programs and techniques that you use yourself.

    Having a private, personal meeting? Turn off the phone, remove the battery. So as not to reveal place meeting, it is better to do this before you go to the meeting. If you can't disconnect the battery, just leave the phone somewhere safe.

Internet via mobile phone

The user ID in Signal is (for simplicity) your mobile phone number. Unfortunately, this means that without a valid mobile phone number you won't be able to use Signal, even if you prefer wi-fi. Additionally, if you want to contact someone on Signal, you'll have to give that person your phone number. Those for whom this is a problem can pay attention to other messengers with a “good reputation”, for example, Wire(Android, iOS).

Answers to the following questions will help you choose a mobile messenger:

  • What do digital security experts say about it?
  • Is this a free program? Open source?
  • Does it support end-to-end encryption between two users?
  • Does it support end-to-end encryption in group text chat?
  • Does it support end-to-end encryption for group voice communications?
  • Does end-to-end encryption protect transferred files?
  • Is it possible to set messages to "self-destruct after reading"?
  • Will the program work on a slow Internet connection?
  • Who is the developer of the application, should you trust him?
  • Who is the owner of the server, what is its policy regarding the storage of calls and messages?
  • Can you use one account on multiple devices?
  • Are all major operating systems supported?
  • Is it possible to use an email address and username to register rather than a phone number (which will separate your account from your real identity)?
  • Is it possible to use the messenger without giving it access to the contacts on the device?
  • Can it be used on a mobile device but not on a phone?
  • Can you (or someone you trust) run your own server and communicate through it?

Sending and receiving email on a smartphone

Are you going to read important email on your mobile device? Make sure encryption is turned on, as discussed in Android Security Basics. (On the latest iPhone models, encryption is turned on by default; the only important thing is to choose a strong password). This will not protect your mail all the way to the recipient, but it will prevent someone who tries to read it after losing/stolen a mobile device. You may find this guide helpful on how to keep your communications private.

This guide deals in particular with GPG-encryption of email on Windows, Mac and Linux computers. It is also possible to send and receive encrypted mail on Android devices, but not without difficulties. (There is currently no free GPG encryption for iOS).

Most security experts advise against storing your secret encryption key anywhere other than your main work computer. (Moreover, do not carry the key with you). However, you will need this key to read encrypted messages on your mobile device. Today, Android devices are more secure than they once were, and your private key is protected with a strong password. Thus, if you really necessary send and receive such important data on your Android device, and switching to a secure messenger does not suit you, you can install GPG on it.

To do this you need:

  1. Install and configure GPG and a key management application, for example, OpenKeychain .
  2. Copy your secret key to your device.
  3. Install and configure an email application that works with OpenKeychain, For example, K-9 Mail .

Not just calls and messages

Mobile phones are multifunctional devices, small computers with their own operating systems and downloadable applications. Mobile phones provide a variety of services. Much of what you do on a computer you can do on a smartphone today. And, of course, there are many things that you can do on a smartphone, but not on a computer.

Browsing Websites

Even the most basic mobile phones can't connect to the internet, but those are rare these days. If you use a browser on your Android device to browse, among other things, restricted websites, consider using a virtual private network (VPN) or app Orbot(Android versions of Tor Browser).

VPN on Android device

A VPN creates an encrypted tunnel from your device to a VPN server somewhere on the internet. VPN helps protect outgoing and incoming traffic. This is especially important if traffic passes through an insecure local or national network. However, since all traffic goes through the VPN provider, it can see everything that has now become inaccessible to view from the local network or the Internet access provider. It's important to choose a VPN service you trust and remember to use HTTPS when transferring valuable data.

In some countries, VPNs are illegal or have limited access. Find out what the situation is in the country where you plan to use the VPN. Remember that a VPN does not hide the fact that you are using a VPN.

To use a VPN, you will need to install a client application and create an account with the VPN provider. Riseup Team offers a free, open-source VPN client for Android called Bitmask and supports the free VPN service Riseup Black. (If you already have a Riseup Red account and know how to manually set up a VPN, you can use the app OpenVPN for Android(Play Store, F-Droid) with your username and password Riseup Red. (Application OpenVPN for Android free and open source).

Tor on an Android device

To have anonymous access to sites, you can use a couple of Android applications: Orbot And Orfox. Orbot routes Internet traffic through the anonymous Tor network. Orfox is a mobile version of Firefox that uses Orbot and provides additional protection for your privacy. Together, these two apps allow you to bypass online filters and visit websites anonymously, the same thing that gives Tor Browser for Windows, Mac and Linux.

You can learn more about anonymity and censorship circumvention in the corresponding guide.

Photo and recording

Smartphones allow you to take photos, record sound, and shoot video. These are all powerful tools for documenting events and disseminating information about them. The privacy and safety of those appearing on camera and in the recording must be respected. For example, if you recorded an important event, and then the phone fell into the wrong hands, this could lead to trouble for both you and the subjects of your report. Some tips on what to do to manage such risks:

  • Think about how you can securely and quickly upload recorded files online and delete them from your device.
  • Use tools to blur the faces of people in your photos and videos, and distort the voices of those you record.
  • Find out which programs and settings you can use to get rid of metadata in media files. Examples of such metadata are the GPS coordinates of the places where the photographs were taken, the parameters of the camera that was used to take the photo.

The Guardian Project has created and maintains a free, open-source app called ObscuraCam, which works with photos and videos to blur faces and remove metadata.

if you necessary save faces, voices and metadata, then it is especially important that your device is encrypted. Files that you copy from the device to somewhere else for storage or transfer should also be encrypted. Driven by this idea, programmers Guardian Project developed the Proof Mode application, antipode ObscuraCam. Proof Mode“pulls out” maximum metadata from the material, which can help establish the authenticity of an image or video. This metadata is stored separately from the corresponding images and videos; transmit them only through secure channels.

  • Connect your phone to your computer only if you are sure that there is no malicious code on the computer. For more information, see our guide to protecting your computer from viruses and phishing.
  • Just like with a computer, be careful when connecting to a wi-fi network without a password.
  • Turn off Wi-Fi, Bluetooth, and Near Field Communication (NFC) when not using these features. Enable them only when necessary and only to connect to trusted networks and devices. Whenever possible, use a cable to transfer data.
  • from The Intercept

There are very real concerns that cell phones may increase the risk of brain tumors and other types of tumors in the head and neck area.

As you can see, Chinese brands such as Xiaomi, OnePlus and Huawei, as well as Lumia 630 from Nokia, took the first places. At the same time, the iPhone 7 ranks 11th, the iPhone 8 is 13th, and the iPhone 7 Plus is 16th.

Unfortunately, there are no universal guidelines for “safe” levels of mobile radiation, but in Germany, for example, the government body Der Blaue Engel (“Blue Angel”), which sets environmental standards and has already proven itself to be a reliable guide for consumer.

This body considers only those mobile phones to be safe if their SAR value does not exceed 0.60 watts per kg. All phones from the above list have a SAR level twice as high as this indicator, and the Xiaomi M1A1 model tops the list with an indicator of 1.75 watts/kg.

And these are the smartphones with the least radiation:

As you can see, the least radiation comes from smartphones such as Sony Experia M5 (0.14), Samsung Galaxy Note 8 (0.17) and S6 edge+ (0.22), Google Pixel XL (0.25) Samsung Galaxy S8 (0.26) and S7 edge (0.26).

If you want to check your phone's radiation levels, check the manual that came with it or go to the manufacturer's website, or you can visit the FCC website, Deadbees.net writes.

How to avoid exposure to radiation?

The most powerful radio signal is from the transmitting antenna, which in modern smartphones is hidden inside the case. In this case, the waves lose energy and weaken as they move away from the phone. Most users hold their cell phone to their ear while talking, but the closer the antenna is to their head, the higher the expected exposure to radiated energy, according to the ACS.

Scientists believe that tissues closest to the phone's body absorb more energy than those further away, and there are ways to help minimize the harmful effects:

1. Reduce the amount of time you spend talking on the phone.

2. Use your phone's speakers or a headset - this way you can keep the phone away from your head.

3. Position yourself as close to a cell phone mast as possible: mobile phones are configured to use as little energy as possible to get a good signal. The further away you are from the mast (or inside a building or location with poor reception), the more power your phone will need to get a good signal.

4. Choose devices with a low SAR rating.

Smartphones and mobile phones have long become an indispensable assistant in a person’s daily life. With their help, we can always contact loved ones, acquaintances or at work - there are many situations.

But as you know, any technological progress carries with it certain consequences. Is a mobile device harmful to humans?

How does a mobile phone work?

Cell phone - a mobile phone designed to work in cellular networks; uses a radio transceiver and traditional telephone switching to carry out telephone communications within the cellular network coverage area. [Wiki]

This is, in fact, a complex high-tech electronic mobile communication device. Includes a transceiver for 2-4 microwave bands, a specialized control controller, interface devices, a display, and a battery.

The cellular device constantly communicates with various base stations. When moving, the smartphone periodically switches from one station to another, maintaining the best signal level. This happens even when the device is in standby mode (the screen is locked).

I think there is no need to dive into the complexity of technological processes for transmitting radio signals. I’ll try to tell you the basics “on your fingers”.

The walls of the building retain radio waves in the range of 1-2 GHz, reducing the signal power by 10-20 dB, i.e. 10-100 times. Due to the nature of communication standards, not all additional power will be available when the phone is taken outside.

The attenuation of radio waves is proportional to the square of the distance traveled. What does it mean? Let’s say the distance from the antenna of the tube tightly pressed to the ear to the cerebral cortex is 1 cm. Then, by moving the tube away from the ear by 1 cm, you will double the distance to the brain, and the emitted power of the smartphone’s antenna will decrease by 4 times.

Radio waves, even as short as 1800 MHz, are polarized. For this reason, it is important that the transmitting and receiving antennas are oriented in the same way (preferably vertical). By simply changing the orientation of the GSM handset from vertical to horizontal, the level of the signal received from the base station decreases by an average of 5 dB (3 times).

Harm from a mobile device

Electromagnetic radiation of the radio frequency range generated by a smartphone is absorbed by the tissues of the head (brain, retina, structures of the visual, vestibular and auditory analyzers). Moreover, radiation affects both individual organs and the entire nervous system.

Scientists have proven more than once that electromagnetic waves cause tissue heating. Over time, this affects the functioning of the entire body, in particular the functioning of the nervous, cardiovascular and endocrine systems. Many users can imagine this for themselves - does it happen that you experience unpleasant heating (chromosomal aberrations) around the ear? People under 30 years of age are at greatest risk.

In addition, scientists say that children who use smartphones are at increased risk of memory and sleep disorders. The main reason is low-intensity electromagnetic radiation that can penetrate the child’s thinner skull. It has, so to speak, reduced shielding.

You told me horrors here. How can you protect yourself then?

First of all, you need to try to reduce the frequency of using your mobile device. For example, reduce the duration of calls to 2-3 minutes at a time, and per day - to half an hour. You can use a speakerphone or a wireless headset - there the effect on the brain is minimal.

Having trouble sleeping at night? Then put your smartphone away. It affects the body even in standby mode. And when carrying the device, do not put it in your pocket, use a bag, backpack, whatever - the minimum distance to the gadget should be at least 50 cm.

Note that in the case of shielding (machine, reinforced concrete room), the flux density of electromagnetic radiation (EMR) affecting a person increases many times over. therefore, try to use the device near windows that allow radiation to pass through.

What is also important - do not use your smartphone in places with a known poor signal level, such as the subway, elevator, basement and others. There, the problem arises not only in shielding, but also in the frequency of searching for the optimal signal level.

Do not put your smartphone to your ear while you are away or searching for a network. At this moment the radiation is highest. When choosing a gadget, try to find out about the radiation level (SAR) - the lowest indicator will be the best.

Useful tips

The vast majority of people have a smartphone at arm's length all day long.

At work we have it in our pocket or next to it on the table, on the way home in public transport we have it in our hand, and before going to bed it goes on the bedside table. Due to its constant proximity to us, many people have a very reasonable question: is there any risk to health in the long term?

Despite the fact that no serious research has been carried out on the long-term effects of radio radiation from a telephone on the human body, there are still smartphones that emit the maximum amount of ultrashort waves when pressed to the ear.

Phone damage

It is important to add that there are no standards for safe radiation from a mobile phone. At the same time, certification by the German company for environmental friendliness “Der Blaue Engel” is issued only to those smartphones whose specific absorption coefficient is lower than 0.60 W/kg.

So, we list smartphone models that have exceeded this figure twice or more. Next to the phone model, the specific absorption coefficient is indicated when the mobile phone is pressed to the ear.

Let's start from the end, with the most radiation-heavy smartphones.

Harm of mobile phones

1. OnePlus 5T - 1.68 W/kg



2. Huawei Mate 9 - 1.64 W/kg



3. Nokia Lumia 630 - 1.51 W/kg



4. Huawei P9 Plus - 1.48 W/kg



5. Huawei GX8 - 1.44 W/kg



6. Huawei P9 - 1.43 W/kg



7. Huawei Nova Plus - 1.41 W/kg



8. OnePlus 5 - 1.39 W/kg



9. Huawei P9 lite - 1.38 W/kg



10. iPhone 7 - 1.38 W/kg



11. Sony Xperia XZ1 Compact - 1.36 W/kg


12. iPhone 8 - 1.32 W/kg



13. ZTE AXON 7 mini - 1.29 W/kg



14. BlackBerry DTEK60 - 1.28 W/kg



15. iPhone 7 Plus - 1.24 W/kg



Now we will share with you some more facts about the dangers of gadgets.

1. Many people think, what is the harm of a mobile phone? After all, manufacturers claim that the level of radio emission is so low that it cannot adversely affect human health.

In reality, everything is not like that. Sanitary inspections have been repeatedly carried out at the state level, which have scientifically confirmed the fact that modern mobile phones are not safe, they can affect the human heart, brain and reproductive system around the clock, because harm is caused not only during a conversation, but at any time, when the phone is just left on.

The smartphone is next to us almost every minute. This versatile device constantly sends and receives signals as it uses radio frequency electromagnetic fields to transmit data on a mobile network.

Journalists from Bild conducted a study and found out when radiation is considered dangerous to humans, as well as which mobile devices have the highest and lowest radiation.

In 2016, American researchers discovered a connection between mobile phone radiation and the occurrence of such a dangerous disease as cancer. During the study, rats were exposed to electromagnetic waves for several years, which caused brain and heart tumors.

What is SAR?

The Federal Office for Radiation Protection has been studying radiation from cell phones and smartphones since 2002. The so-called SAR value (electromagnetic absorption rate) is expressed in watts per kilogram (W/kg).

When is radiation dangerous?

According to the Federal Radiation Protection Agency, a device with a SAR value of 0.6 W/kg is considered harmless. The World Health Organization considers a mobile device to be dangerous when the SAR value exceeds 2.

What kind of radiation does the iPhone have?

Apple mobile phones: iPhone 7 (1.48 W/kg) ranks 10th in the ranking. Its brothers iPhone 8 (1.32 W/kg) and iPhone 7 Plus (1.24 W/kg) are less harmful. Apple devices were not included in the ranking of smartphones with the least radiation.

How can you protect yourself?

Use a headset or speakerphone system. Do not hold your smartphone near your ear.

Pause background data updates to prevent your device from running unnecessarily at night.

If possible, use Wi-Fi.

These smartphones have the highest SAR ratings

5th place: Huawei P9 Plus with 1.48 W/kg


4th place: Nokia Lumia 630 with 1.51 W/kg


3rd place: Huawei Mate 9 with 1.64 W/kg


2nd place: OnePlus 5T with 1.68 W/kg


1st place: Xiaomi Mi A1 with 1.75 W/kg


These smartphones have the lowest SAR values








2024 gtavrl.ru.