πŸ”“ Check My Email πŸͺͺ What is PII? βš”οΈ Common Attacks πŸ“‹ App Permissions Explained βœ… What to Do Right Now 🚨 Cleaner Apps ExposΓ©
πŸ”“ Data Breach Checker

Has your data been leaked?

Enter your email below. We'll check it against a database of known data breaches and tell you exactly what was exposed β€” and what to do about it.

πŸ”’ SlamDoor doesn't store your email. We check it once and forget it.

What is a data breach?

A data breach happens when a company's database is hacked and sensitive user information β€” emails, passwords, phone numbers β€” is stolen and exposed. Attackers use this data to break into other accounts (especially if you reuse passwords), run phishing scams, or sell it on dark web marketplaces.

You don't have to do anything wrong to appear in a breach. The company you trusted with your data was the one that got hacked. What you can control is how you respond β€” and responding fast matters.

PII and SPII β€” What's the difference?

Two terms you need to know: PII (Personally Identifiable Information) and SPII (Sensitive PII). Both can be used against you β€” SPII just does more damage faster.

PII β€” Personally Identifiable Info

The basics about you

Any data that can be linked back to you as an individual. Alone it seems harmless β€” but combine a few pieces and someone can impersonate you, spam you, or sell your profile.

Your name Email address Phone number Home address Birthday IP address Photo with location data
SPII β€” Sensitive PII

The stuff that ruins lives

A step beyond PII. This data is directly tied to your financial security, health, legal status, or physical safety. A breach here can have consequences that last years.

Social Security Number Bank account numbers Health records Passport / ID scans Biometric data Precise GPS location Sexual orientation

πŸ›‘οΈ Why this matters for your phone

Pre-installed apps often request access to your location, contacts, microphone, and camera β€” all of which are PII or SPII collection points. When an app you never opened has your contacts and real-time location, you've handed over PII without knowing it. SlamDoor flags exactly which apps are doing this so you can shut the door.

Why protecting it is hard

The data economy is built on you not noticing. Apps collect data in the background β€” when you're not using them. They share it with "analytics partners" buried 12 pages deep in a Terms of Service nobody reads. Your data gets sold, aggregated, and combined with data from dozens of other sources to build a profile that knows your income bracket, health concerns, relationship status, and political views.

The answer isn't paranoia. It's knowing which apps are worth the tradeoff β€” and removing the ones that aren't. That's exactly what SlamDoor is for.

The five attacks that get most people

Hackers don't need to be geniuses. They reuse the same five playbooks, over and over, because they work. Here's what they are and how to spot them.

🎣
Phishing
Fake messages that trick you into handing over your login
Most Common

Phishing is when someone pretends to be a trusted source β€” your bank, Apple, Amazon, PayPal, even your boss β€” to trick you into clicking a link and entering your password. The link looks real. The page looks real. The only tell is the URL.

Real example You get a text: "Your PayPal account has been limited. Verify here: paypa1.com/verify". Notice the "1" instead of "l"? That's the whole trick. You log in, they capture your password, and your money is gone within minutes.
βœ“ Check the URL before clicking βœ“ Go to the site directly β€” don't click links βœ“ Enable 2FA on every account βœ“ When in doubt, call the company
🦠
Malware & Spyware
Software installed on your device that watches everything you do
High Risk

Malware is any software designed to harm you. It hides in apps, email attachments, and sketchy downloads. On Android, it can come pre-installed by your carrier or manufacturer β€” which is exactly why SlamDoor flags those apps.

Spyware is a type of malware that silently records what you type, where you go, what you say, and who you call. It reports all of this back to whoever planted it β€” without making a sound.

Real example In 2022, Xiaomi's Mi Browser was caught sending browsing history β€” including searches done in "Incognito mode" β€” back to Xiaomi's servers. The data included what you searched for, every site visited, and your unique device ID.
βœ“ Only install apps from Google Play βœ“ Remove unknown pre-installs (SlamDoor helps) βœ“ Check which apps have background data access βœ“ Keep Android updated
πŸ‘€
Man-in-the-Middle (MitM)
Someone intercepts your internet traffic without you knowing
Medium Risk

When you connect to public Wi-Fi β€” at a cafΓ©, airport, or hotel β€” someone on the same network can position themselves "in the middle" between you and the websites you visit. They can read your traffic, steal session cookies, and intercept passwords on sites that don't use HTTPS.

Real example You're at an airport and connect to "Free_Airport_WiFi". The network was actually set up by an attacker on a laptop nearby. Every page you visit goes through their machine first. They capture your email login details while you "check your flight."
βœ“ Use a VPN on public Wi-Fi βœ“ Only use HTTPS sites (padlock in browser) βœ“ Avoid banking on public networks βœ“ Turn off auto-connect to public Wi-Fi
πŸ“±
SIM Swapping
Attackers steal your phone number to bypass two-factor authentication
Devastating

SIM swapping is when an attacker calls your mobile carrier, convinces them they're you (using PII they bought or scraped from breaches), and gets your phone number transferred to a SIM they control. Now they receive your texts β€” including every 2FA code you're sent. They log into your email, then your bank, then everything else.

Real example In 2021, a 19-year-old SIM-swapped dozens of victims and stole over $16 million in cryptocurrency by intercepting their 2FA codes. The carrier transferred the numbers after an attacker gave basic personal details available from data breaches.
βœ“ Add a PIN/passcode to your carrier account βœ“ Use authenticator apps, not SMS 2FA βœ“ Never share your phone number publicly βœ“ Ask your carrier about port freeze options
🎭
Social Engineering
Manipulation that exploits trust, urgency, or fear
Growing Fast

Social engineering doesn't hack your system β€” it hacks you. It works by creating a situation where you feel urgent pressure to act without thinking. A "tech support" call warning your computer is infected. An "IRS agent" threatening arrest. A "prize notification" asking for shipping details. The goal is always the same: get you to hand over information or access before you stop to question it.

Real example The 2020 Twitter hack β€” where celebrities' accounts were hijacked to run a Bitcoin scam β€” started with a social engineering call. An attacker called Twitter employees, pretended to be IT support, and convinced them to reset credentials. No code was ever written. People were the vulnerability.
βœ“ Hang up and call back on official numbers βœ“ Urgency is a red flag, not a reason to act βœ“ No legitimate company asks for passwords βœ“ Verify before you act

What those permission requests actually mean

When an app asks for a permission, it's asking for a key to part of your life. Here's what each permission actually lets an app do β€” and why some apps have no business asking for them.

Permission What it accesses Risk if abused
πŸ“ Location
Your real-time position, home address (inferred), workplace, travel patterns HIGH
πŸŽ™οΈ Microphone
Can listen via your mic anytime the app is running in the background HIGH
πŸ“· Camera
Can capture photos or video β€” some exploits do this silently HIGH
πŸ‘₯ Contacts
Your entire address book β€” names, phone numbers, emails, relationships HIGH
πŸ’¬ SMS
All your text messages β€” including 2FA codes from your bank HIGH
πŸ“ Storage
Read files on your device, including documents, photos, and downloads MEDIUM
πŸ“ž Phone
Your call history, device IMEI (a unique phone identifier) MEDIUM
πŸ“… Calendar
Your schedule, appointments, meeting details, who you meet with MEDIUM
πŸ”” Notifications
Can read all notification content from every other app MEDIUM
🌐 Internet
Network access β€” nearly all apps need this, but it enables data exfiltration EXPECTED

🚩 Red flag: permissions that don't match the app's purpose

A flashlight app that wants your contacts. A weather app that wants your microphone. A game that wants SMS access. When a permission has no obvious connection to what the app does, that's a data grab β€” not a feature. On the scanner results, SlamDoor shows you which permissions each app holds so you can make the call.

How to audit permissions on Android

Go to Settings β†’ Privacy β†’ Permission Manager (exact path varies by phone). You'll see every permission group and which apps hold it. If an app has a permission you'd never have granted knowingly, revoke it β€” or remove the app entirely.

What to do right now

You don't need to become a security expert. You need to do ten things. Here they are, prioritized.

Do this now

πŸ” Enable 2FA on every account

Email, bank, social media β€” all of it. Use an authenticator app (Google Authenticator, Authy) instead of SMS when possible. This single step stops most account takeovers.

β†’ Start with email and banking
Do this now

πŸ”‘ Use a password manager

Reusing passwords means one breach unlocks everything. A password manager creates and stores unique passwords for every site. You only remember one master password.

β†’ Bitwarden (free) or 1Password
Do this today

πŸ” Check if you've been breached

Visit haveibeenpwned.com and enter your email addresses. If you show up in a breach, change those passwords immediately and review what data was exposed.

β†’ haveibeenpwned.com
Do this today

πŸ“± Review your app permissions

Settings β†’ Privacy β†’ Permission Manager. Revoke location, microphone, and camera from any app you don't actively use. If an app breaks, you can re-grant.

β†’ Start with location access
This week

πŸ—‘οΈ Remove bloatware you don't use

Every app you don't use is an attack surface. Pre-installed apps run in the background and report home. SlamDoor tells you which ones to remove.

β†’ Scan your phone with SlamDoor
This week

πŸ”’ Add a PIN to your carrier account

Call your carrier and set a SIM PIN or account passcode. This is your SIM swap defense. Without it, your phone number can be transferred with just your name and address.

β†’ Call carrier support to set it
This week

πŸ“₯ Update your operating system

Security patches fix vulnerabilities attackers actively exploit. An unpatched Android is like a door with a known broken lock. Updates close those gaps.

β†’ Settings β†’ System β†’ Software Update
This week

🌐 Use HTTPS everywhere

Check that sites show a padlock in the address bar. Never enter a password on a site that shows "Not Secure." Install a browser extension like HTTPS Everywhere if needed.

β†’ Look for the padlock icon

Start with your phone

The fastest security win is removing the apps that shouldn't be there. SlamDoor shows you exactly what's on your phone and what it's doing β€” no tech knowledge required.

SlamDoor my phone β†’