yes, your phone is already hacked

Поделиться
HTML-код
  • Опубликовано: 26 апр 2021
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • НаукаНаука

Комментарии • 722

  • @patdevine3151
    @patdevine3151 3 года назад +321

    loi is by far one of the best free hacking resources you're going to find. Love the content bro!

    • @SK-me9by
      @SK-me9by 3 года назад +5

      No no this is not.....

    • @patdevine3151
      @patdevine3151 3 года назад +4

      @@SK-me9by Then when why don't you list them and be helpful instead of talking BS about this guy!

    • @amoltofi1
      @amoltofi1 3 года назад

      @@patdevine3151 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

    • @playgames247
      @playgames247 3 года назад

      @@patdevine3151 how to use john the ripper. i have termux

    • @ahmadshami5847
      @ahmadshami5847 3 года назад +4

      @@patdevine3151 S K is right, although this guy sometimes show some useful stuff, his best content is just for members. he only shows how to pawn android phones with a payload that no one will probably install on their device even if you were a social engineering expert. not hating on the guy but their are better free resources out there that I will be glad to point you to. resources that actually explain what are you doing and the bare metal stuff.

  • @LoiLiangYang
    @LoiLiangYang  3 года назад +36

    Like, share and subscribe :)

    • @fissionplane32
      @fissionplane32 3 года назад +2

      Hi Loi, I'm a big fan of your work, I just want to ask : do you need root permissions in order to execute the reverse shell?
      Thanks in advance

    • @luisidrogo3672
      @luisidrogo3672 3 года назад

      Soy de Perú, entendí todo el video pero sugiero subtítulos en español, gracias por compartir, lo pondré a prueba

    • @mdlikhon2839
      @mdlikhon2839 3 года назад

      How to sent victim this app ???? :(

    • @krishnasingh-sm5ij
      @krishnasingh-sm5ij 3 года назад

      If I want to learn how can I do

    • @mdlikhon2839
      @mdlikhon2839 3 года назад

      @@krishnasingh-sm5ij yes

  • @docholliday1811
    @docholliday1811 3 года назад +244

    You know it gets more scary every day as hackers are always one step ahead.

    • @mewzi
      @mewzi 3 года назад +8

      especially with zero-day exploit

    • @defyteryt2452
      @defyteryt2452 3 года назад +4

      @@mewzi exacly .non reported exploit

    • @pickeljuice4479
      @pickeljuice4479 3 года назад +2

      Also the good ones are getting 1 step ahead

    • @amoltofi1
      @amoltofi1 3 года назад

      @@pickeljuice4479 correct

    • @linuxd
      @linuxd 2 года назад

      @@amoltofi1 yeah but did you know the good ones are 1 step ahead

  • @GeoffereyEakinsTech
    @GeoffereyEakinsTech 3 года назад +24

    Here's the really scary part... Your manufacturer can easily integrate malware into any device that you have purchased from them. Worse yet an OTA update could be distributed at anytime to bug it. This means manufacturers and carriers alike can modify your phone at a lower level than installed apps and have access to a lot more than a reverse shell through app could provide.

  • @nganpoiis8961
    @nganpoiis8961 3 года назад +29

    Its just the tip of the iceberg. There's way scarier stuffs out there.

  • @crowlsyong
    @crowlsyong 3 года назад +8

    I also love when you say "it's game over" lol love it. thanks again for what you do

  • @defyteryt2452
    @defyteryt2452 3 года назад +185

    best notification ever

    • @kong6581
      @kong6581 3 года назад +2

      This needs more like lmfao

    • @defyteryt2452
      @defyteryt2452 3 года назад

      @@kong6581 yeh 😊

    • @amoltofi1
      @amoltofi1 3 года назад

      @@kong6581 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

    • @jokrassassinsam2492
      @jokrassassinsam2492 3 года назад +2

      You see right when you turn your phone on you just see "yes your phone is already hacked"

    • @galaxynightowl3289
      @galaxynightowl3289 3 года назад

      69

  • @MrBledi
    @MrBledi 3 года назад +51

    hats of to meterpreter for creating all those great libraries and making everything seem so easy and fun

    • @amoltofi1
      @amoltofi1 3 года назад

      I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

  • @b391i
    @b391i 3 года назад +7

    Zero-click is one of the popular android attacks.

  • @temmmbebkd2922
    @temmmbebkd2922 3 года назад +6

    It will be awesome if you explain all the stuff you are doing in details but thank you awesome video 😌

  • @atlonrg
    @atlonrg 3 года назад +6

    Thank you very much for sharing, With you we learn a lot to be careful on my devices, I really like your videos.

  • @jondo7680
    @jondo7680 3 года назад +10

    Me: spoofing gps position
    Hacker: I found someone who can travel faster than light

  • @muhammadyahya8392
    @muhammadyahya8392 3 года назад +15

    1) modern android versions wont let you install malicious apps
    2) not always all permissions are already granted automatically, usually the app will ask
    3) this wont work on Ios
    4) this wont work outside your own network unless you have port forwarding
    5) even if you give manual permission to install meterpreter payload after some time android will terminate it
    🙂

    • @WigglyWings
      @WigglyWings 3 года назад +5

      It's a click bait video.

    • @prohax3475
      @prohax3475 3 года назад +2

      it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network

  • @dgreene2701
    @dgreene2701 3 года назад +5

    This should be the first video they make you watch at the store after giving you a new smart phone.

    • @monkeyseemonkeydo432
      @monkeyseemonkeydo432 3 года назад +1

      Lol...yes MAKE you watch...strapped to a chair ...head held in frontal position with eye lids held open so you can’t even blink

  • @PizzaSlices2000
    @PizzaSlices2000 2 года назад

    how to gain anxiety in 0.1 seconds

  • @rubendebbarma5040
    @rubendebbarma5040 3 года назад +3

    Bro you are good at explaining and teaching us, we love you and respect you keep up doing what you do

  • @mytwosatoshis4052
    @mytwosatoshis4052 3 года назад

    Lol, why do I feel like you would be called in a Hacking/tech Avengers style show

  • @techbuddy3161
    @techbuddy3161 3 года назад +5

    That's why after installing i disallowed permission of every app😂

  • @kandy1249
    @kandy1249 3 года назад

    Yea. This does make sense. I saw half of it.. and i knew what you are talking about.

  • @ezruy
    @ezruy 3 года назад +3

    What you did will only work if:
    1) The MainActivity front-end app for meterpreter somehow gets onto the phone (it cannot magically appear on the phone on it's own). Some possible ways of this happening include installing an unknown app outside of Google Play Store, installing an app from Google Play Store that is really a Trojan that has managed to escape Google's detection (yes this is a real issue), or Hacker has had physical access to the phone to install the meterpreter app on the phone, or maybe ISP or rogue cell provider pushed the malicious app to the phone through Sim Tool Kit or other methods.
    2) ADB debugging must be enabled to allow the phone to communicate to the shell server. This requires enabling developer mode on the phone & specifically allowing the server to connect to the phone. Again, can't magically happen without user intervention unless there is some 0-day put there that is being actively exploited to do this without any user interaction.
    All in all, if you are very careful on what you install on your phone, the likelihood of this scenario happening is very rare.
    Also, stuff like meterpreter and "(insert your verb here)Sploit" are just script engines that runs script-based exploits that are based off of databases contributed by the hacking community in general and do not require special skills to use. Since they use scripts, they are also therefore limited in the way that script usage is limited, such as validity of the script (has the target computer been patched for that CVE) etc etc.
    How about teaching us some real hacker skills.

    • @devcycleops
      @devcycleops 3 года назад

      Im curious to know.Can ISPs gain acces to their consumers pc via some methods .As they have a certain degree of control over the configuration

    • @adilzade
      @adilzade 2 года назад

      no one on youtube teaches real stuff

  • @JerMiz
    @JerMiz 3 года назад

    I love these videos, not only that we get to learn to hack but we also learn how easy it is to get hacked.

  • @jerrickgodwin3351
    @jerrickgodwin3351 2 года назад

    Yes. When Calculator asks you for permission to make calls and messages.

  • @gester27
    @gester27 3 года назад +2

    Great content thanks for sharing. It's great to bring awareness to this. Coming from a slight cyber security background I understand the importance of security. Hence why I never give permissions to majority of my apps LOOOL which gives me problems at times haha. Love this.

  • @Rovsau
    @Rovsau 3 года назад +4

    Great hands-on content.
    I'm a rusty IT guy who has been hyper-conscious about this stuff since before HTC Desire.
    Your videos are a gold-mine. Thank you.

  • @Mohamed-wm4oz
    @Mohamed-wm4oz 3 года назад +7

    I am Egyptian and I learn everything from you. I was tempted to download explanations and have it translated into Arabic
    And thank

    • @1ali1996
      @1ali1996 3 года назад +1

      same here brother .. Salam alikom from Iraq-baghdad

    • @Mohamed-wm4oz
      @Mohamed-wm4oz 3 года назад +1

      @@1ali1996 مرحب بيك يا حبي وتحيه كبيرة لاهل العراق الشقيقه

    • @amoltofi1
      @amoltofi1 3 года назад

      @@Mohamed-wm4oz I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

  • @lolyou5645
    @lolyou5645 3 года назад +38

    the fact that your content works only on your device is funny as hell

    • @BloodyLiFe255
      @BloodyLiFe255 3 года назад +2

      Not using this guide, but ive hacked my samsung device, although with some issues, i was able to gain full access

    • @lolyou5645
      @lolyou5645 3 года назад +5

      @@BloodyLiFe255 mate look i probably know every single command line in linux and every script so we are not talking about basic knowledge but i literally couldnt gain any sort of access using these kind of free guides mate there's some tricks related to the victim's device which need some advanced level of ethical hacking i tried everything on my deviceand my brothers devices and i couldnt reach anything at the moment so like idk what the actual fuck is happening but yea i just mentioned my experience my guy

    • @amoltofi1
      @amoltofi1 3 года назад

      @@lolyou5645 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

    • @YISTECH
      @YISTECH 3 года назад +16

      @@lolyou5645 you sound like someone who knows zero

    • @polporta2382
      @polporta2382 3 года назад +11

      @@lolyou5645 if you knew every single line in command line and every script, you would not watch this tutorials, you could create your own malware

  • @silentdoc6473
    @silentdoc6473 3 года назад +1

    Ur the best one in the category of ethical hacking vids!! But i dont understand what happens to the phone of the respective ip address once we use the 'exploit' command:( It would be great if u could clarify my doubt. And also keep doing whatever u are doing my man;)

  • @juneilquilana5159
    @juneilquilana5159 3 года назад +3

    Your so amazing idol! Thank you always for your tips👍

  • @X-secular
    @X-secular 3 года назад +3

    Thanks for Information 🙂☺️

  • @harambeinhumanform
    @harambeinhumanform 2 года назад

    Hmmm, funny how i refreshed RUclips and its the second recommended. Hmmmmmmmmmm

  • @lucasvazquez7631
    @lucasvazquez7631 3 года назад +52

    Every first 10 seconds of every video, Loi seems to be some kind of antivirus salesman.
    Later on in the video you realize this is the kind of guy antivirus companies learn from.

    • @amoltofi1
      @amoltofi1 3 года назад

      I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
      Insta I'd- amoldhaygude

  • @ghxstface._.polonivm
    @ghxstface._.polonivm 3 года назад

    He:- Ur phone is fully hacked…😈
    Me on Ipad:- R u sure about that?😂😂😂

  • @crowlsyong
    @crowlsyong 3 года назад

    I love your side view camera. Good to know so lamens like me can try to increase security to avoid the evil version of you haha. Much love thanks for what you do.

  • @jameslindsay7846
    @jameslindsay7846 2 года назад

    Would love to see your assessment of the BlackBerry android phones

  • @ahmedalzahrani7356
    @ahmedalzahrani7356 3 года назад +1

    Thank you for the great video.

  • @Drusher10
    @Drusher10 3 года назад +2

    Best content/educational creator

  • @nathankeel4308
    @nathankeel4308 2 года назад

    Hackers only have to get it right once, consumers and cyber security specialists have to get it right every time

  • @Chitraansh02
    @Chitraansh02 3 года назад +8

    Payloads dont work on high security androids above 11 version

    • @PNCNDNOB
      @PNCNDNOB 3 года назад

      And IOS??

    • @rakeshdudy3638
      @rakeshdudy3638 3 года назад

      but why

    • @Chitraansh02
      @Chitraansh02 3 года назад

      @@rakeshdudy3638 because new androids have security patches that don't let these payloads pass through them

  • @HighTablePlayer
    @HighTablePlayer 3 года назад

    What if phone doesn't have internet plans..?? 😁😆

  • @theelitecoder5981
    @theelitecoder5981 3 года назад

    Great man 😊😊😊 ur god !! Thanks for updating us with all the information 👍

  • @techbuddy3161
    @techbuddy3161 3 года назад +5

    I'm a medical student bt my passion is always about tech & this trick of permission i know. & now sir you're conforming my belief that i can also be the hacker....✌⭐

  • @korndawgboys4jesus130
    @korndawgboys4jesus130 3 года назад +3

    Awesome video!
    Do you think you could do this for iOS?

  • @bomdila
    @bomdila 3 года назад

    Please make a video on the services whose permissions and which permissions can be allowed so that everything else can be disabled

  • @prof.milkdickphd5170
    @prof.milkdickphd5170 3 года назад +5

    Im using a black berry classic :)

  • @behim3679
    @behim3679 3 года назад

    Yes, I knew my phone is already hacked, but this time is not the time I would respond

  • @maxmanmx1440
    @maxmanmx1440 3 года назад

    One question please, is your Ethical Hacking course explain all this in detail?
    Love 😍 your videos

  • @wajahatawan2019
    @wajahatawan2019 3 года назад +5

    How you made that app?? Show complete procedure if you want to teach completely. Thanks

    • @priyangshuhazowary
      @priyangshuhazowary 3 года назад

      it's already available in his channel. i did once seeing him

  • @kevinportillo1971
    @kevinportillo1971 3 года назад +1

    2:02 into the video and so far all this js about is on apps permissions which is no shocker.

  • @xXN1GHT
    @xXN1GHT 3 года назад

    you can disable sensors.

  • @naveedsmusic
    @naveedsmusic 3 года назад

    Exactly what I want thanks sir

  • @waynesvan4676
    @waynesvan4676 3 года назад

    So, if I go through all of the apps and set them to 'only while using the app' is that better? or unless they are all set to off privacy doesn't exist? but I guess some of the apps will not function without storage access etc..? is there anything you suggest to secure the phone...... can we see a log of any data downloaded by apps?

  • @anonymous4298
    @anonymous4298 3 года назад

    Oh ya, before I forget.. use the messaging app “signal” instead of SMS or WhatsApp or anything else to ensure end to end encryption and privacy.

  • @lickingaborrachero
    @lickingaborrachero 2 года назад

    The title gives me a panic attack.

  • @DrPritamShah
    @DrPritamShah 2 года назад

    Which virtual mobile machine you are using? Whether it is Gene motion?

  • @princerawat4679
    @princerawat4679 3 года назад +2

    This is classic attack, this was the first things I learnt. Love are making everyone aware ❤️

    • @princerawat4679
      @princerawat4679 3 года назад

      @Jens Meier for this attack to work on videos he is the owner of the app and bypassed all security warning while installing. Problem with these types of attack are that the code is known by smartphone as virus already so you have to make it undetecteble

    • @princerawat4679
      @princerawat4679 3 года назад +3

      @Jens Meier Naa, in a nutshell he is making a apk using metasploit(hacking software) which can be injected to other apk to look legit but for this demo he just installed it alone and perform the attack. So he is actually hacking but his own device

  • @galivenkat
    @galivenkat 3 года назад

    Can you please explain through burpsuite in windows

  • @ahmadshami5847
    @ahmadshami5847 3 года назад +1

    it's a technique that probably won't work in a real case scenario as it is so hard to ulter a target to download and install the payload, even hard on a social engineering expert. plus these kinds of tutorials aren't good for new learners, it makes them script kiddies. so please if you are reading this and you are a beginner go learn how these things work on a low level, like ADB and listening servers and Android development also networking and then come back and learn these automated things when you actually know the basics and fundamentals that these techniques rely on. good luck and keep learning 👍

  • @iMoistCookie
    @iMoistCookie 3 года назад

    Yes, I know that already

  • @MrGalovagun
    @MrGalovagun 3 года назад +8

    informative

  • @sigma_z
    @sigma_z 3 года назад

    I click deny deny deny to everything. including having a phone. 🤣

  • @rexquickman
    @rexquickman 3 года назад +1

    jokes on you i dont have phone

  • @comradecatos6711
    @comradecatos6711 2 года назад

    4:48 well i guess you can say its usefull if you got your phone stolen

  • @mirzagazanffarali9775
    @mirzagazanffarali9775 3 года назад +1

    your content is best it really help me much.

  • @storytellingfromeli
    @storytellingfromeli 3 года назад

    cc said it was "Food Control" A "Full Control"

  • @zahidjaan1319
    @zahidjaan1319 3 года назад

    Ahh it's really scary !
    Thank U so much Sir for an awesome video !!

  • @alwu5071
    @alwu5071 3 года назад +5

    Hi, defense methods for these hackers would be great

    • @alwu5071
      @alwu5071 3 года назад

      @You thought it was a joke? lol kind of true

  • @CyberBoy_69
    @CyberBoy_69 3 года назад +2

    Thank You

  • @Drlegit-qn1jh
    @Drlegit-qn1jh 3 года назад

    Love u bro . Keep us updated like it

  • @leelavathisuragani5779
    @leelavathisuragani5779 3 года назад

    Lol he showed voms virtual space😂

  • @dariopodda4663
    @dariopodda4663 3 года назад

    It doesn't connect to the phone actually. From Kali the TCP reverse is started, but any app I click on the smartphone doesn't do nothing, even thoose that have geoloc permissions.

  • @tonywhite4476
    @tonywhite4476 3 года назад

    So do you need to be in close proximity of the phone or do you only need the number or in address to do this?

  • @JithinDKurup
    @JithinDKurup 3 года назад

    The best part is that android itself handling by google and we do not knw what permissions and code we are having inside the firmware 🥶 we are being hacked since we started using electronic gadgets 😎

  • @nexuz4258
    @nexuz4258 3 года назад

    Intel processors are backdoored aswell

  • @BestForexBroker2024
    @BestForexBroker2024 3 года назад

    Can you unlock a Google Pixel 3a with GrapheneOS installed on it ? I m thinking that a setup like this is pretty much unbreakable because the USB won t work while its locked and the time limit won t allow you to brute force it.

  • @febbriandonguila2077
    @febbriandonguila2077 3 года назад

    Luckily, i dont have smartphone lol xD

  • @mhasisetuobelho2086
    @mhasisetuobelho2086 3 года назад

    Tnx for another amazing video 😁😀

  • @pain6424
    @pain6424 3 года назад

    -Yes, your phone is already hacked
    -FUcK OfF, IM Not UsING AnDRoiD

  • @azmantuah4371
    @azmantuah4371 3 года назад

    Hey Liang, I saw termux on your phone. Can you make a video of the app? Is it a mobile version of Linux?

  • @xhessijoy4386
    @xhessijoy4386 3 года назад

    You are just great!

  • @mrsimo7144
    @mrsimo7144 3 года назад

    I'm new to this. So can you send a payload without the owner clicking or download anything? Or do they have to do something? Thanks. From the UK. ❤️

  • @kylraj8091
    @kylraj8091 3 года назад +3

    Hello love the show watching from Kenya. If I may ask, what is the best solution to avoid this problem.

    • @priyangshuhazowary
      @priyangshuhazowary 3 года назад

      the hacker needs to install an app in your phone. but Google will warn you with a dialog box saying that the app asks for too many sensitive permissions. but you can still install the app and give all the permissions.
      In layman's terms uninstall an app right away if it asks for too many unnecessary permissions

    • @prohax3475
      @prohax3475 3 года назад

      @@priyangshuhazowary it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network

    • @priyangshuhazowary
      @priyangshuhazowary 3 года назад

      @@prohax3475 can you name it? Huh?

  • @LegitDevWeb
    @LegitDevWeb 3 года назад

    might be easy to run that little exploit but if the mobile user does not have your hacked app installed on their device there is nothing you can do to their phone and the only way to get your hacked app on any device is to either install it yourself by having access to their device or by manipulating someone or as we hackers call it social engineering to get them to install the app and that's not an easy task so I don't think someone has to be scared of this. lol

  • @shaikhhaker3030
    @shaikhhaker3030 3 года назад +1

    The old benchmark trick showed In mr robot S2 E8 can be done practically please tell

  • @ryuzabi
    @ryuzabi 2 года назад

    thx, now i am more paranoid then before
    i rlly have crisis abt that shit lol

  • @santhoshsivan1721
    @santhoshsivan1721 3 года назад

    Please..Can you tell me what tool you are using?

  • @RajendranathBehera
    @RajendranathBehera 3 года назад

    Very scary but helpful video. Thanks for sharing the information.
    🙏 Jai Jagannath 🙏

  • @startwith.foodguys3346
    @startwith.foodguys3346 3 года назад

    Sir..very informative..but how search main activity in all anroid and iPhone??

  • @amrzakaria5290
    @amrzakaria5290 3 года назад +2

    Thanks a lot

  • @elviraarriaga1424
    @elviraarriaga1424 Год назад

    Thank you for Your Educational Video content and i can relate to some of the video content and my phone has been hacked for few years now and i'm a randomly picked target smear campaign individual for few years now

  • @geopolitica5106
    @geopolitica5106 3 года назад

    teacher I have a question about the application on the mobile, how to get it there to put it in connection with the listening IP?.

  • @kandy1249
    @kandy1249 3 года назад

    Please make a twitter account if you don't have it already and have an email so people can contact you in formal way.

  • @juandj
    @juandj 3 года назад

    Your *Android* phone, that is.

  • @rickytofen2299
    @rickytofen2299 3 года назад +2

    Hey, i really want to get into hacking but i don"t know how to start... What do i have to learn first ?

  • @dxtni
    @dxtni 3 года назад

    What Laptop/PC do you use ?, that's Literally Amazing cause you Dont Have any kind of Lag and stuff

  • @falkensmaze3230
    @falkensmaze3230 3 года назад

    No it's not.

  • @playforpassion7111
    @playforpassion7111 3 года назад +2

    I have several questions haha one being don't you need a malicious apk and 2 is Lhost your ip or the device ip

  • @itsmedheeraj01
    @itsmedheeraj01 3 года назад +2

    Good video 🤝

  • @fortunembulazi
    @fortunembulazi 3 года назад

    Hi bro, any advice for someone like me who's a programmer and wants to get started on ethical hacking?

  • @abhishekverma2568
    @abhishekverma2568 2 года назад

    not now with google protection.

  • @Keaza.
    @Keaza. 3 года назад +1

    You're already past the hard part, getting the application on the target phone and running it on the target phone. Social engineering is half the work of hacking someone.

    • @WigglyWings
      @WigglyWings 3 года назад +2

      Exactly, how do you even get the app on device. I don't install any app outside of play store and even from play store I only use limited sets of trusted apps which are widely used from big devs. The chances of me gettings a malware on my phone are pretty pretty low.

    • @prohax3475
      @prohax3475 3 года назад +1

      @@WigglyWings it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network