Your device may not actually be turning off
One of the important things to realize these days is that when you turn a device off, it may not actually be turning off. Instead, it might go into a standby or low-power mode and keep working in some way depending on the device, while looking like it is not functioning anymore. It’s especially important to keep this in mind when you care about privacy and security. Let’s take a look at what this means and what you should watch out for.
When you turn such a device ‘off’, it might, for example, still be recording certain information while using various components such as the microphone, Wi-Fi, NFC and Bluetooth radios when they are present. An example of this is Apple’s iPhone. Here’s from How-To Geek, “What Does ‘iPhone Findable After Power Off’ Mean?” (May 22nd 2022):
Starting with iOS 15, certain recent models of iPhone (such as iPhone 13) can be remotely located while powered off thanks to the Find My network and the Find My app. This is possible because even when powered off, the iPhone provides a small amount of reserve power to the Bluetooth, UWB, and NFC chips. The feature can help you find a lost iPhone more easily, even if the battery has died.
And here’s more on this from LiveMint, “Your iPhone is still broadcasting your location after shutdown or theft – here is how it works” (December 7th 2025):
Apple’s Find My network can locate an iPhone even when it is switched off, using nearby Apple devices to relay encrypted location data. […] Apple’s Find My network has quietly become one of the company’s most powerful security tools, allowing iPhones to be located even after they have been switched off. The technology, built into every model since the iPhone 11, uses nearby Apple devices to relay encrypted location data, offering users a significant advantage when a handset goes missing or is stolen. […]
Since the iPhone 11, Apple has equipped its devices with low-power Bluetooth technology that continues to function briefly after shutdown. When Find My is enabled, nearby Apple devices, whether they belong to you or strangers, can detect your iPhone and relay encrypted location data back to iCloud. This process is anonymous, and a thief cannot disable it simply by turning the phone off.
That sounds like a very nice ‘feature’ to have to recover a lost or stolen phone, until you think a little further about how this ‘feature’ can be used against you! I’m sure you can imagine that this ‘feature’ is a privacy and surveillance nightmare. Apple is able to know your exact location, and that of others around you, even when your phone is supposedly turned ‘off’. The UWB (Ultra-Wideband) technology that is still receiving power when the phone is off, can be used for the following:
Like Bluetooth and Wi-Fi, ultra-wideband is a wireless communication protocol that uses radio waves. Ultra-wideband offers high bandwidth with low power usage, but it only works over short distances. That’s why other wireless technologies like Bluetooth and Wi-Fi are still useful: They have a longer range. Unlike “narrowband” technologies, UWB transmits data over a wider frequency (above 500 MHz). Bluetooth and Wi-Fi are unreliable ways of detecting distance and position. Sure, a device with a stronger signal is probably closer than one with a weaker one, but that’s all you can detect–and it’s not perfect, as signals could be boosted to trick the system. Rather than depending on signal strength, the iPhone will measure the round-trip time of the signal to determine the distance it is from another device. Through multiple antennas, UWB can also measure the angle the signal is arriving from. A precise angle combined with a precise distance means your iPhone can pinpoint an object to a reasonably precise location in space.
If Apple can know this, then so can any other rogue entity such as the government (yes, all governments are criminal organizations) or anyone else that has somehow gained access to your device and/or your Apple account.
Device manufacturers might give you the option through the operating system to be able to turn this ‘feature’ off if you don’t want to use it. Apple appears to give users this option in iOS as explained above. But this is no guarantee that this ‘feature’ will actually be turned off by the operating system! Apple might simply lie, or there might be a bug in their software, or, an attacker who somehow gains access to your device might enable this ‘feature’ while you don’t realize it, as we’ve seen with SIM cards recently.
The device manufacturer might even become the victim of a supply chain attack, where one or more back-doors get added into hardware and/or software components that are shipped with the device. Such back-doors could then be used to enable the device to spy on you even while it’s turned ‘off’. As it becomes increasingly difficult to hack into devices using vulnerabilities in software, rogue entities are looking more and more into getting back-doors into devices via the supply chain. It’s not very difficult to do this, since any intelligence agency that takes themselves serious have their spies working at most Big-Tech companies and/or their suppliers these days. In any device, there are subcomponents that come with their own software (AKA‘firmware’) which is usually just a binary blob that the device manufacturer does not have access to (low-level, source code etc.) and cannot verify what’s inside. This can be the firmware that drives your Wi-Fi and Bluetooth modems, for example. Now if you consider that the Mossad from Israhell added bombs to walkie-talkies and pagers in a 10-year supply chain operation, and chips in iPhones were apparently back-doored in a 4-year operation, then anything is possible (see the footnotes in my post “On the FBI and France framing GrapheneOS” for details).
This is why it’s very important to have physical hardware kill-switches on a device that allow you to physically turn off and disable a component in the device, such as the camera, microphones, Wi-Fi/NFC/Bluetooth radios and any sensors that can be used to spy on you. 1 These switches must physically disable power and data lines to these components. This way, even when the software on your phone doesn’t work as advertised and/or gets compromised, you can still ensure that the functionality that they can use is physically limited by turning off the components using the hardware switches. An example of a device that has such switches is the Librem 5 mobile phone. The Librem 5 also tries to minimize or mitigate the use of binary firmware blobs.
It’s important to keep in mind that it’s not a question of if your device gets compromised, but when. No matter what operating system you use on your device, it’s only a matter of time until some kind of vulnerability is used to break into the device. When that happens, the hardware switches are the only way in which you can still limit what can be used to spy on you and it could make a substantial difference. You could also go the Edward Snowden route and open your device and physically disable certain components by disconnecting their cables or desoldering and removing them completely. Snowden is known to have desoldered microphones from his mobile phone for example and using an external microphone when needed to make calls. But this is obviously less convenient than having hardware switches. And unfortunately, removing the battery to make sure that a device is really off is not always a possibility, especially not for most modern mobile phones and tablets these days.

Comments
There are 3 responses. Follow any responses to this post through its comments RSS feed. You can leave a response, or trackback from your own site.