Apple and Google regularly introducing niche capabilities within the operating system updates which are little known to ordinary users. Secret features of smartphones uncovered by the project’s expert NAFI “Digital citizen” Vladimir Gritsenko, reports the Agency “Prime”.
So, in Android, in iOS there is a function that takes care of the hardware of the smartphone. So, they have a protection mechanism which stops the charging if the charging port is dirty or wet. Also in both operating systems, you can see the approximate information about the battery wear. While on iPhone you can use the function “optimised charging” — it allows to reduce the time harmful for the device status, when the smartphone is connected to the network and thus already loaded.
According to Gritsenko, the few smartphone owners know about the useful inline functions for working with files. For example, the app “Files” on iOS is the ability to scan documents. This functionality is also available in some shells of Android, such as Samsung, and stock Android to scan through Google Drive.
“On the iPhone are also rich built-in functionality for processing photos and videos: not only can you choose the start and end of the video, and rotate videos, change the frame size”, — he added. Both systems also support recording video from screen smartphone.
The expert added that Android and iOS provides functionality to prevent unwanted access to user information by others. So, with the gadget, which is the protection of the entrance, it is possible to remotely delete information, and to see where it is located, which can be helpful in case your phone is stolen. On some Android smartphones have the ability to hide applications hide messages or photos. On iOS, currently you can only hide pictures, said Gritsenko.
In June IT trainer was advised to restrict the applications access to the functions of the device. The main risk of malicious applications the ability to read SMS-messages — for example, malicious programs can get access to one-time codes from banks and intercept the account of the owner of the gadget. Released unknown by the developers of the applications need to restrict access to data and to ensure that the requests of the creators do not go beyond the functionality of the service. For example, fraudsters can gain access to the notebook devices, social networking, camera, and microphone.