Several apps spy on screens, share content



[ad_1]

Hyderabad: While people believe that apps listen to their conversations to target them with commercials, a search for about 17,260 apps reveals that this may not be entirely true. So, the next time you talk about t-shirts and an online sale of t-shirts on your phone, this could be a mere coincidence or else other users are interested

. , no substantial evidence has been found to prove applications are listening to conversations. At least 9,000 applications have requested camera and microphone permissions. Researchers Elleen Pan, Jingjing Ren, Martina Lindorfer, Christo Wilson and David Choffnes conducted an experiment to study Google Play, App China, Mi.com and Anzhi apps.

Several applications filter the recorded contents of the camera and the screen on the Internet, and unexpectedly given the purpose of the application. The researchers noted, "Our badysis reveals that several apps share images and video data with other parties in unexpected ways. For example, many photo editing applications process images in the cloud without explicitly mentioning the behavior in their privacy policy. "

Although applications do not listen to phone conversations, some applications record the phone screen and send the data to third parties. Analytics, revealed the study of a year. "Unlike the camera and audio APIs, the APIs for taking screenshots and saving videos from the screen are not protected by any permissions. This lack of access control is problematic because applications can potentially record screen interactions of users without their knowledge, "they said in their study, Panoptispy: Characterization of Audio Exfiltration and video from Android apps.

-provisioning permissions when it comes to apps. Some apps that do not need the camera are looking to According to Arrka's research, Indian applications take permissions that are 3.5 times more dangerous than those of US applications, and a more localized search can point out the defects or position of our applications. users, they can simply revoke it parameters, it is the developers and auditors who must be precise, "said security researcher V. Vikrant.

H7

[ad_2]
Source link