. . "This has extended to hacking a mobile phone in order to gain access to things not originally meant to happen, such as changing icons and fonts or installing homemade applications for free." . . .