Cell Phone Privacy and Unwanted Access Informational Report

Page 1


22, 2025

1. Introduction

In today’s digital world, mobile phones are more than just phones. They are our personal secretaries. They manage our schedules, store our health and insurance information, act as our bank and workstations, and encapsulate our entire social lives through apps, photos, videos, and voice messages. Even our thoughts, plans, and sometimes passwords are kept in note apps making our phones both our diaries and our digital identities. With this kind of access, it is no surprise that mobile devices make prime targets for cyber threats. A private and secure device is defined as being “free from the danger or risk of an asset loss or data loss” [1]. What are the chances that your phone is safe?

This informational report discusses cell phone privacy and how to prevent unwanted access, or in other words, when “a person gains logical or physical access without permission to a network system, application, data, or other resource [2]. You will be walked through the different types of threats, how to recognize signs of compromise, and most importantly, what steps you can take to protect your device and data from the many risks that disguise as convenience.

With real-world examples, reputable statistics, and a step-by-by-step guide for both iOS and Android devices, this report serves to help mobile users of all levels stay informed and in control.

2. Different Types of Mobile Privacy Threats

A. Phishing and Mishing (Mobile Phishing)

Phishing is when an attacker impersonates a trusted, legitimate entity to trick potential victims into giving sensitive information Similarly, mishing is phishing that happens exclusively on cell phones. This type of tactic often utilizes SMS text messaging apps (smishing), voice calls (vishing), emails, QR codes (quishing), and fake websites [3].

• As of 2024, 82% of phishing scams happen on cell phones [4], and 76% of phishing sites now use a secure protocol known as HTTPS. Traditionally, users were taught to trust "S” in HTTPS, as it stands for “secure”. Today, even malicious websites can use HTTPS as it only encrypts the connection and not the content of the site itself. Phishing pages can still look legitimate while being dangerous.

• Owned by Google and requiring HTTPS by default, the .dev domain is often trusted by users visiting the site. In 2023, 40% of phishing sites used the .dev domain [4]

July 22, 2025

Example: A user receives a text claiming to be from their bank, warning them of suspicious activity putting their account on temporary hold. In the text, the bank urges the user to click a link that will reactivate their account. This link asks the user to confirm their credentials, leading to a successful login credential harvest.

B. Downloading Malicious Apps:

Malicious apps often disguise themselves as helpful but once installed, they can steal your data, sell your data, spy on you, or download more malware.

• A breakdown per category showed that malicious apps often come in the form of photo editors (42.6%), business utilities (14.1%), phone utilities (15.4%), games (11.7), VPNs (11.7), and lifestyle apps (4.4%) [5].

• 60% of iOS apps and 43% of Android apps are vulnerable to leaking personally identifiable information (PII) [4].

Example: To edit a photo for social media, a user decided to download a seemingly harmless photo editor app. Unbeknownst to the user, this app has secretly installed spyware, gaining access to the camera without the user’s consent [6].

C. Unsecured Wi-Fi

Public Wi-Fi networks, like the ones in coffee shops, airports, or hotels, often have no encryption. Data sent over them can be intercepted by anyone within the vicinity. Attackers can employ a man-in-the-middle (MITM) attack to eavesdrop, steal login credentials, or inject malware onto those devices. Because public networks are easy to access and usually unsecured, they’re a common target for cybercriminals.

• According to Forbes, 40% of respondents who used public Wi-fi had their information compromised [7]

Example: An employee on a business trip connects to “free airport Wi-Fi" that happens to be a fake Wi-Fi network set up by a hacker to steal email and social media credentials [8].

D. Outdated Operating Systems

Outdated Operating systems are prone to critical security vulnerabilities that their updated counterparts are not. When an operating system gets updated, the former vulnerabilities are publicly documented. Attackers can easily reference these documentations to exploit outdated devices, making them easier targets [9].

• 61.2% of Android devices and 49.2% of iOS devices run on outdated operating systems during any given 12-month period [4].

Report July 22, 2025

Example: A user keeps postponing system updates, thinking they’re time-consuming. Consequently, this delay leaves a known vulnerability unpatched. An attacker exploits it remotely to install spyware, allowing them to monitor the device without the user ever clicking on a link or opening an app.

E. Excessive App Permissions

Mobile apps require permissions to perform tasks such as access to photos, contacts, location, microphone, and camera. For example, Some apps ask for way more access than they need. If not careful, users could be granting third-party apps permission to collect, share, or even sell personal data without realizing it. Once an app has permission, it doesn’t need to hack your phone; it already has the access it needs. [10].

Commonly Exploited Permissions:

• Camera: Given camera permission, photos or video can be taken without consent.

• Microphone: Granting microphone access could enable an app to record conversations or build advertising profiles [11]

• Location: Enabling location while using an app could reveal your home address, workplace, daily stops, and information that can be sold or used for advertising, stalking, burglary, or adverse purposes. [11].

• Storage: Granting storage access could allow the app to access personal files, photos, and downloads, which can be extracted or sold to third parties.

• Contact list: Sharing your contact list with certain apps could lead to targeted advertising or data being sold to third parties.

• Bluetooth: Enabling Bluetooth may open the door to wireless exploitation or device tracking.

Before granting an application permission, consider its function. Do not give an app permission outside of its scope of use.

3. Signs of Compromise

If your mobile device is behaving unusually, it could be a sign of compromise.

Common symptoms include:

• Unrecognizable downloads, messages, purchases, etc. [12].

• Applications randomly open on their own [12,14].

• Diminished battery capacity [12].

• Device slows down [12].

• Applications crashing [12].

• Pop-ups [12,14].

22, 2025

• Unexplained data usage

• New apps

• Mysterious outgoing calls

What to Do Next

Take immediate action if you suspect your phone is hacked:

1. Delete suspicious apps [13].

2. Check your accounts [13].

3. Update login credentials [13,14].

4. Alert contacts

5. When in doubt (as a last resort) factory reset.

4. Limiting App Access

A recent report lists that 69% of users’ digital media time is actually spent on mobile phones only [15]. A widespread, and continuous use launched mobile devices as the primary platform for personal data collection subsequently used in targeted ads. Targeted ads pose serious privacy risks and concerns such as third-party tracking [16]. Even though mobile users still use browsers to access different websites, applications (apps) are gradually replacing browser function. Most mobile applications contain at least one ad library that enables targeted advertising [16] The instructions below provide a guide for disabling tracking across apps.

Screenshots & Step-by-Step Help:

In this section we will walk through the different types of ways you can make your phone secure. We will cover both iOS and Android.

For iOS

A. Disable App Tracking

B. Turn off Ad Personalization

C. Disable Safari Tracking:

D. Disable iCloud & Siri Suggestions Tracking:

For Android

E. Disable App Tracking

F. Turn off Ad Personalization

G. Delete Current Advertising ID

H. Disable Web and App Activity

I. Turn off Usage & Diagnostics:

For iOS

A. Disable App Tracking

1. Open the Settings app.

• Tap the settings icon on your home screen.

Figure 1.1: iPhone home screen with the Settings app highlighted.

2. Go to Privacy & Security.

• In settings, scroll down and tap Privacy & Security.

Figure 1.2: Settings menu displaying the “Privacy & Security” option.

22, 2025

3. Select Tracking.

• Under Privacy & Security, tap Tracking.

Figure 1.3: Privacy & Security menu with the “Tracking” option visible.

4. Disable Allow Apps to Request to Track.

• Toggle it off to automatically deny tracking requests from new apps.

Figure 1.4: Tracking settings showing “Allow Apps to Request to Track” turned off (switch turns grey

22, 2025

B. Turn off Ad Personalization:

1. Open the Settings app.

• Tap the settings icon on your home screen.

Figure 2.1: iPhone home screen with the Settings app highlighted.

2. Go to Privacy & Security.

• In settings, scroll down and tap Privacy & Security.

Figure 2.2: Settings menu displaying the “Privacy & Security” option.

Report

22, 2025

3. Select Apple Advertising.

• In the Privacy and Security menu, scroll down and tap Apple Advertising.

4. Turn off Personalized Ads.

• Toggle Personalized Ads to the OFF position (gray).

Report July 22, 2025

2.3: Privacy & Security menu showing “Apple Advertising.”

C. Disable Safari Tracking:

1. Open the Settings app.

• Tap the settings icon on your home screen.

Figure 2.4: Apple Advertising settings with “Personalized Ads” disabled (switch turns grey).

2. Access Apps

• Tap Apps.

Figure

Report July 22, 2025

3.1: iPhone home screen with the Settings app highlighted.

3. Find Safari

• In Apps, tap Safari.

Figure 3.2: Settings menu showing “Apps.”

4. Enable Privacy Settings.

• Toggle the following options to ON (green).

i. Prevent Cross Site Tracking

ii. Hide IP Address

Figure

Report July 22, 2025

Figure 3.3: Apps list with “Safari” selected. Figure 3.4: Safari settings showing tracking protections toggled on (switches turn green).

6. Go to Advanced Settings.

5. Disable Seach and Suggestion Tracking.

• Scroll down and turn off the following:

i. Search Engine Suggestions

ii. Safari Suggestions

• Scroll to the bottom and tap Advanced.

Report July 22, 2025

Figure 3.5: Safari settings with “Search Engine Suggestions” and “Safari Suggestions” turned off (switch turns grey)

7. Block All Cookies (Optional).

• In Advanced, toggle Block All Cookies to ON. Note: This may break certain websites or logins.

Figure 3.6: Safari settings scrolled to the bottom with “Advanced” selected.

Report July 22, 2025

Figure 3.7: Advanced Safari settings showing the “Block All Cookies” toggle. To block, turn on (switch will turn green)

D. Disable iCloud & Siri Tracking:

1. Open the Settings app.

• Tap the “Settings” icon on your home screen.

2. Go to Privacy & Security

• In settings, scroll down and tap Apple Intelligence & Siri.

Report July 22, 2025

Figure 4.1: iPhone home screen with the Settings app highlighted.

3. Go to Apps

• Under Apple Intelligence & Siri, scroll down and tap Apps.

Figure 4.2: Settings menu showing the “Apple Intelligence & Siri” option.

4. Select an app, and toggle ‘Learn from this App” off.

Report

22, 2025

Figure 4.3: Apple Intelligence & Siri menu showing the “Apps” option under app access settings.

Figure 4.4: Individual app settings with “Learn from this App” toggled off (switch turns grey)

22, 2025

For Android

E. Disable App Tracking

1. Open Chrome

• Tap the profile icon located in the top right corner of the browser.

2. From the menu, go to Settings.

• Scroll down and tap privacy and security.

July 22, 2025

Figure 5.1: Google Chrome homepage with the user profile icon highlighted in the topright corner.

3. Under the Privacy section, select “Send a ‘Do Not Track’ request.”

Figure 5.2: Chrome Settings menu showing the “Privacy and Security” option.

4. Toggle the switch to turn it on.

• This will send website requests asking not to track your browsing activity.

July 22, 2025

5.3: Privacy and Security settings in Chrome showing the “Send a ‘Do Not Track’ request” option.

5.4:

Not Track settings screen with the toggle switch turned on (switch turns blue)

F. Turn off Ad Personalization:

Figure
Figure
Do

Report

July 22, 2025

1. Open the app drawer. Swipe up or open the app drawer icon to view all

2. Go to Settings.

• Tap Settings from the app list.

Figure 6.1: Android home screen Figure 6.2: App drawer view with the Settings icon highlighted.

3. Access Your Google Account

4. Open the Data & Privacy tab

• Tap on profile icon again to access Data & privacy.

Informational Report

July 22, 2025

• Tap your profile icon or name to open your Google Account dashboard.

Report

July 22, 2025

Figure 6.3: System Settings menu showing the “Google” option under Accounts and Backup.

Figure 6.4: Google Services page displaying the user profile icon and recommended service cards.

5. Scroll to the “Personalized Ads” section

6. Disable Search Personalization

• Scroll to Search personalization and toggle it Off.

Report

July 22, 2025

• Tap My Ad Center and turn off Personalized Ads.

Figure 6.5: Google Account dashboard under the “Data & privacy” tab with the “Personalized ads” section visible.

Figure 6.6: Google Account settings showing “My Ad Center” and “Search personalization” toggled off.

July 22, 2025

G. Delete Current Advertising ID

7. Open the app drawer.

• Swipe up or open the app drawer icon to view all apps.

Figure 7.1: Android home screen

9. Select Google.

8. Go to Settings.

• Tap Settings from the app list.

Figure 7.2: App drawer view with the Settings icon highlighted.

10. Navigate to Ads.

Report July 22, 2025

• In settings, tap “Google.”

Figure 7.3: System Settings menu showing the “Google” option highlighted

11. In Ads, tap “Delete advertising ID.”

• Under All Services option located in the top right corner, scroll down to select Ads.

Figure 7.4: Google Services settings under “All services” with the “Ads” option highlighted.

12. Delete Advertising ID and confirm deletion.

22, 2025

Figure 7.5: Google Ads settings showing the “Delete advertising ID” option.

Figure 7.6: Confirmation screen for deleting the advertising ID with a blue “Delete advertising ID” button.

Report July 22, 2025

H. Turn off Web & App Activity:

1. Open the app drawer.

• Swipe up or open the app drawer icon to view all apps.

3. Select Google.

2. Go to Settings.

• Tap Settings from the app list.

4. Manage your google account

Figure 8.1: Android home screen. Figure 8.2: App drawer view with the Settings icon highlighted.

Report July 22, 2025

• In settings, tap “Google.”

Figure 8.3: System Settings menu showing the “Google” option highlighted.

• Tap your Google account profile at the top, then select “Manage your Google Account.”

Figure 8.4: Google Services screen with user profile icon visible for accessing account management.

5. Navigate to Data & Privacy

6. Turn off the following options:

• Web & App Activity

July 22, 2025

• In your account settings, swipe to the Data & Privacy tab.

• Timeline

Report July 22, 2025

Figure 8.5: Google Account settings page with the “Data & privacy” tab highlighted.

I. Turn off Usage & Diagnostics:

1. Open the app drawer.

• Swipe up or open the app drawer icon to view all apps.

Figure 8.6: Account activity settings showing “Web & App Activity” and “Timeline” paused.

2. Go to Settings.

• Tap Settings from the app list.

Report

July 22, 2025

Figure 9.1: Android home screen. Figure 9.2: App drawer view with the Settings icon highlighted.

3. Select Google.

• In settings, tap “Google.”

4. Open Usage & Diagnostics and Turn It Off.

• Scroll down and tap Usage & Diagnostics, then toggle the switch off to stop sending device data.

Figure 9.3: System Settings menu showing the “Google” option highlighted.

5. Securing Your Phone

Figure 9.4: Usage & diagnostics settings with data sharing toggle turned off (switch turns grey).

Most of these privacy protections can be set up right in your phone settings or within individual apps. Taking just a few minutes to adjust these options can make a significant difference in keeping your data private, especially in public spaces, or if your phone is ever lost or stolen.

A. Prevent Shoulder Surfing

Report

July 22, 2025

Shoulder surfing is the act of secretly observing someone’s screen to steal sensitive information like passwords, PINS, etc [17]. To reduce shoulder surfing and unwanted access, implement the following measures:

• Buy a privacy screen

Blocks side glances on public transportation or in crowded areas [18]

• Mask lock screen notifications

Keeps sensitive content (e.g., texts or app alerts) hidden when the phone is face-up [19].

• Set a short auto-lock timer

Ensures the phone locks itself quickly when idle and unattended, minimizing the window of opportunity for unauthorized access [19].

• Lock sensitive apps with a passcode or Face ID

Biometric authentication such as FaceID or fingerprint adds a layer of security unique to you that’s harder to replicate [19].

B. Manage Location Permissions

Your location can reveal a lot about you. Where you live, work, or have your daily routines. Many apps ask for it even when they don’t need it. Here's how to stay in control:

• Deny location access to non-essential apps

For example, mobile games typically do not need your location [20].

• Enable “Ask Every Time” for occasional-use apps

Useful for delivery or ride-share apps that only need access when placing an order [21]

• Allow continuous location only for critical apps

Apps like Maps or Find My Device may require ongoing access for accurate functionality [21]

• Use “Approximate Location” when possible

Appropriate for weather apps and similar tools that only need general area information [21].

C. Disable Passive Listening

Many phones listen for wake words like “Hey Siri” or “Hey Google” by default, which means the mic is always on. To cut back on unnecessary listening:

• Disable “Hey Siri” or “Hey Google”

Stops always-listening mics from triggering mid-conversation [19, 22]

• Restrict microphone and camera access

Report

July 22, 2025

Only allow access to apps with a clear, justifiable need

• Limit photo permissions to selected images

Instead of gaining fill library access, select only the images you wish to share.

D. App Permission Hygiene

Apps often ask for more access than they really need. Being strict here can protect you from oversharing information.

• Block contact access for unnecessary apps

For instance, a flashlight or calculator app, should not request access to your contacts.

• Select “Ask App Not to Track” (iOS) or “Disable Ad Personalization” (Android)

Prevents shopping applications from profiling activity across other applications.

• Turn off personalized ads

Stops targeted ads based on recent searches and app history [22]

E. Limit Background Activity

Some applications and features remain on even when not in use, impacting both privacy and battery life.

• Turn off Bluetooth when not in use

Avoids auto-connections and reduces tracking risks [23]

• Disable background app refresh

Restricts apps from pulling data while idle, preserving battery and privacy [24].

F. Strengthen Overall Security

These final settings tie everything together and give your phone a strong security foundation.

• Enable two-factor authentication in your apps

Provides an important additional layer of protection beyond passwords.

• Use a password manager

Stores complex passwords securely and discourages reuse or weak credentials [25]

• Delete sensitive info from notes apps

Avoid storing sensitive information in unencrypted locations such as notes,

• Activate lost device tracking and remote wipe options

Allows you to locate or securely erase your phone if lost or stolen [26].

• Update your phone’s software promptly

Regular software updates and patches close security holes cybercriminals may exploit.

22, 2025

6. Good Habits

Practicing good digital habits helps maintain privacy and security over time, even when there is no immediate threat present. The following practices provided below will help increase your mobile safety and data protection:

• Be picky about downloads: Only download apps from the official app store. Safe applications have high ratings by users, lots of downloads, and a known reputable developer Pay attention to who the developer of the application is. Trustworthy developers usually have multiple apps with consistent branding and regular updates. Look for official names and pay attention to bad clones. Don’t install anything from sketchy links or random texts [23].

• Use Wi-Fi with caution: Public Wi-Fi is convenient, but don’t log into sensitive accounts unless you’re using a trusted VPN or secure mobile data.

• Watch your accounts: Turn on login alerts when possible and avoid reusing the same password everywhere. If one gets leaked, it limits the damage.

• Back things up: Turn on automatic cloud backups for your photos and files. That way, if your phone gets lost or stolen, you won’t lose everything.

• Clean up regularly: Delete apps you don’t use anymore and double-check app permissions, especially after big software updates.

• Keep up with the news: Follow at least one solid tech news account or newsletter. Staying in the loop helps you spot new threats before they hit.

7. Works Cited

[1] Ibm. (2025, June 10). What is mobile security?. IBM. https://www.ibm.com/think/topics/mobile-security

[2] Editor, C. C. (n.d.). Unauthorized access - glossary: CSRC. CSRC Content Editor. https://csrc.nist.gov/glossary/term/unauthorized_access

July 22, 2025

[3] Spoofing and phishing | Federal Bureau of Investigation. (n.d.). https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-andscams/spoofing-and-phishing

[4] Zimperium. (2025). 2025 global mobile threat Report.pdf. https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Repo rt.pdf

[5] Agranovich, D., & Victory, R. (2022, October 7). Protecting people from malicious account compromise apps. Meta Newsroom. https://about.fb.com/news/2022/10/protecting-people-from-malicious-accountcompromise-apps/

[6] Meyer, B. (2025, April 28). These camera apps with billions of downloads might be stealing your data and infecting you with malware. https://cybernews.com/security/popular-camera-apps-steal-data-infect-malware/

[7] Forbes Magazine. (2024, October 15). The real risks of public wi-fi: Key statistics and usage data. Forbes. https://www.forbes.com/advisor/business/public-wifi-risks/

[8] Williams, K. (2024, October 21). Why it’s time to take warnings about using public wi-fi, in places like airports, seriously. CNBC. https://www.cnbc.com/2024/09/29/its-time-totake-warnings-about-using-airport-public-wi-fi-seriously.html

[9] Love, B., Abbas, M. M., Ginther, S., & Flora, J. D. (2024, May 24). What are the cybersecurity risks associated with outdated software and operating systems?. Easy2Patch. https://www.easy2patch.com/blog/cybersecurity-risks-outdated-softwaresystems

[10] Manage application permissions for privacy and security: CISA. Cybersecurity and Infrastructure Security Agency CISA. (n.d.). https://www.cisa.gov/resourcestools/training/manage-application-permissions-privacy-and-security

[11] What app permissions you should avoid giving. Nord Security. (n.d.). https://nordsecurity.com/blog/app-permissions-you-should-avoid-giving

[12] J., H. (2024, October 3). Phone security: How to protect your phone from hackers. Prey. https://preyproject.com/blog/phone-security-20-ways-to-secure-your-mobile-phone

[13] Birchall, M. (2025, March 27). What to dial to see if your phone is hacked: 9 useful codes. Norton. https://us.norton.com/blog/mobile/what-to-dial-to-see-if-your-phone-ishacked

Report

July 22, 2025

[14] Ilevičius, P. (2023, January 12). How to know if your phone is hacked - 5 signs | nordvpn. NordVPN. https://nordvpn.com/blog/how-to-tell-if-your-phone-is-hacked/

[15] Ahuja, S. (2020, December 4). 45 digital and targeted advertising statistics. Grenis Media. https://www.grenismedia.com/blog/45-digital-and-targeted-advertising-statistics/

[16] Ullah, I., Boreli, R., & Kanhere, S. S. (2022, December 24). Privacy in targeted advertising on mobile devices: A survey. International journal of information security. https://pmc.ncbi.nlm.nih.gov/articles/PMC9789888/

[17] McAfee. (2024, January 4). What is shoulder surfing? https://www.mcafee.com/learn/what-is-shoulder-surfing/

[18] Joshua, C. (2025, May 6). Shoulder surfing: What it is and how to keep Prying eyes away. LifeLock Official Site. https://lifelock.norton.com/learn/identity-theftresources/what-is-shouldersurfing?srsltid=AfmBOorEpKaTCRowIzSatHcPUlM5q6iGQ68CBUkckmcDWWOBSn CxezzV

[19] National Security Agency | mobile device best practices. (2020, October 20). https://media.defense.gov/2021/Sep/16/2002855921/-1/1/0/MOBILE_DEVICE_BEST_PRACTICES_FINAL_V3%20-%20COPY.PDF

[20] Howell, G., Franklin, J. M., Shritapan, V., Souppaya, M., & Scarfone, K. (2023, May). Guidelines for managing the security of mobile devices in the ... https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r2.pdf

[21] Chan, K. (2025, February 6). One tech tip: How to block your phone from tracking your location. AP News. https://apnews.com/article/tech-tip-disabling-phone-tracking33f6dedaa4c6f587a4049bceb87daadc

[22] (OCR), O. for C. R. (2022, June 29). Protecting the privacy and security of your health information when using your personal cell phone or tablet. HHS.gov. https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/cell-phonehipaa/index.html

[23] CISA. (2024, December 18). Mobile Communications Best Practice guidance. https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-bestpractices.pdf

[24] Homeland Security | Office of Emergency Communications. (n.d.). Mobile device adoption best practices. CISA. https://www.cisa.gov/sites/default/files/publications/Mobile%20Device%20Adoption%2 0Best%20Practices%20Guide-508%20compliant%20041316%20FINAL.pdf

Report

July 22, 2025

[25] Boeckl, K., Grayson, N., Howell, G., Lefkovitz, N., Ajmo, J., Eugene Craft, R., McGinnis, M., Sandlin, K., Slivina, O., Snyder, J., & Ward, P. (2023, September). NIST Special Publication 1800-22 - Mobile device security. nist.gov. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-22.pdf

[26] Arizona State University. (n.d.). Telecommuting, mobile and Travel Safety Telecommuting, Mobile and Travel Safety | Get Protected. https://getprotected.asu.edu/policy-practices/telecommuting-mobile-and-travel-safety

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.