pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: “What part of the universe is this phone from?”, even if we already know where it is, but we don’t know which operator. Let me tell you that in this little tutorial I’m going to show you how to extract information from a phone through an API with Python.

To use the API it is necessary to register in “numverify”. However, we are lucky on our side “IT IS FREE!”, with limitations, of course; you won’t be able to use it more than 250 times. Is that a problem? NO!, mostly we will only use it to extract some phone numbers or tests, so don’t worry.

Once registered, on the home page in our session, it will show us our API key. We’ll copy it and use the following syntax.

Even if you are not from this planet or this alternate reality and, you don’t have Python installed in your system; just use your browser!

So, this time, let’s use the “requests” library, to make a request to the API and manipulate the data with ease.

In part one (1) we were speechless with the ease in which you could encrypt data using python along with GnuPG now we come with the second (2) part to clarify more methods that gives us this tool and for an extra send the encrypted message to our own inbox.

In some posts of this blog I already cover about how to send an email message through python, however I want to facilitate the work. I took the trouble to create you a module that you can use not only for this example but also for your own script’s/programs.

The module can be found in my Github repository: “floppy – (https://github.com/DtxdF/floppy)”.

Let’s start …
First things first, let’s download Floppy:

git clone https://github.com/DtxdF/floppy.git o If we don’t have Git installed let’s download the zip entering directly from our browser

We agree:

cd floppy

We run python and import what we need:

GnuPG Methods
You may ask yourself “‘Is this what you got us excited for?”, NO!, not only for that, I also want you to know the other GnuPG methods so that you can take full advantage of the potential and create your own programs/scripts in an effective way.

As you can see, we have already learned two things: 1.- Encrypting data; 2.- Sending it by e-mail; Why not learn up to three things?

Before continuing, it is necessary to clarify:
data: The data/string/message to use
passphrase: Password Phrase
verify: Allows data to be verified in the event of an attempted impersonation or involuntary modification
love: Allows you to print/store data in a legitimate format
symmetric: Encrypt the data with a symmetric encryption algorithm (Symmetric encryption means that there is only one password to encrypt and decrypt, contrary to the case of asymmetric encryption)
always_trust: Always trust that it is a legitimate identity, as it is interesting how GnuPG has something called a circle of trust that increases every time we add and verify a new key.
sign: Allows to sign the data
recipient: GnuPG public key identifier
keyid: Practically the same as recipients, only it accepts the identifier/id of the public key being this not an email and is used in other GnuPG methods that I will mention.
secret: In some methods we will see we need to access the secret keys
expect_passphrase: In case you want to export secret keys you need to use the passphrase parameter, with this method you can specify whether or not the passphrase is required to be entered.

I want them to experiment, to immerse themselves in the dark and gruesome methods and attributes that GnuPG offers us. Use the function dir(…) and help(…) as your best friends; If you require a third best friend it will be me, but you have to tell me and finally if you want a third (3) part I will teach you how to use Tor in your client but again I tell you, leave me your comment to know and prepare another entry.

Filed Under: Articles

Latest Articles

Remo Recover Mac Pro Review

PROS: This product is very easy to use, even for a novice. CONS: The price tag is a little steep, but worth it for ease of use and the data recovery options it offers. OVERVIEW: Remo Recover Mac Pro is designed to recover your media files and other lost data. It is for Mac users only, and will … [Read More...]

What Is the Role of Google Analytics in Advertising a Cannabis Site?

In recent years, cannabis businesses have started to embrace SEO. Yet, many of them are still skeptical of digital analytics. This is a big mistake as thriving in the modern economy requires a website and a reliable system to track its performance. Google Analytics is the cornerstone of … [Read More...]

Container vs VM: What Is the Difference and Which One to Pick?

VMs and containers are two implementations of virtualization technology. This means that both VMs and  containers help to optimize how resources are used. However, these two technologies achieve that differently, and the differences between them become clear when you take a deeper look. This … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Core i7 2nd Gen

The Core i7 2nd Gen is an example of innovative engineering. Gone are the days when you had to depend on individual plug in cards to avail the … [Read More...]

Number Systems 4

At first glance all this switching between number systems (decimal, binary and hex) may not seem to be a help at all, but we've seen that only a … [Read More...]

Python Application to Create a Random Boy’s Name

Python is a very powerful language that is used by an estimated 8.2 million people. The number of Python programmers is growing 22% a year. Are … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors