A new Free and Open-Source project called "Exodus" scans Android apps and already has found many advertising trackers:
"Researchers at Yale Privacy Lab and French nonprofit Exodus Privacy have documented the proliferation of tracking software on smartphones, finding that weather, flashlight, rideshare, and dating apps, among others, are infested with dozens of different types of trackers collecting vast amounts of information to better target advertising.
Exodus security researchers identified 44 trackers in more than 300 apps for Google's Android smartphone operating system. The apps, collectively, have been downloaded billions of times. Yale Privacy Lab, within the university's law school, is working to replicate the Exodus findings and has already released reports on 25 of the trackers.
Yale Privacy Lab researchers have only been able to analyze Android apps, but believe many of the trackers also exist on iOS, since companies often distribute for both platforms. To find trackers, the Exodus researchers built a custom auditing platform for Android apps, which searched through the apps for digital "signatures" distilled from known trackers. A signature might be a tell-tale set of keywords or string of bytes found in an app file, or a mathematically-derived "hash" summary of the file itself.
The findings underscore the pervasiveness of tracking despite a permissions system on Android that supposedly puts users in control of their own data. They also highlight how a large and varied set of firms are working to enable tracking."
The statement by Yale Privacy Lab summarizes the situation, and the story has seen coverage by Cory Doctorow and Le Monde. Private search engine Qwant has removed trackers in its app and Protonmail is under fire.
(Score: -1, Offtopic) by Anonymous Coward on Sunday November 26 2017, @08:06PM (5 children)
Privacy Badger https://www.eff.org/privacybadger [eff.org] includes this FAQ/answer:
Maybe there will be an Android version at some point?
(Score: 4, Informative) by frojack on Sunday November 26 2017, @08:52PM (4 children)
Not even remotely germane to the article at hand.
These trackers are not using browsers. They are phoning home directly. Weather, rideshare, and dating apps, social media, ANYTHING that is allowed to access the TCP stack, for what ever reason, probably has this crap built in.
Easy way to find your own likely culprits: Go reset the permissions of all apps, (or at least remove network access permissions). Then just open the ones you use, email, browsers, etc, and re-grant them access to the network. Over the next week you will be bombarded to allow network access to dozens of apps that you use occasional (perhaps unknowingly), all requesting network access. Each time you get nagged, ask yourself "Does this flashlight app have any valid reason to access the net?". If not junk it and get a different app.
At least that will narrow down your leakers to those you EXPECT to talk to the net. But It still won't let you know if the ones you expect to talk to the net are also sending tokens and trackers beyond what is necessary for performing their advertised purpose.
No, you are mistaken. I've always had this sig.
(Score: 1, Interesting) by Anonymous Coward on Sunday November 26 2017, @09:56PM (3 children)
OK, same AC, thanks for the lesson. I'll double-down on my ignorance!
If, as you say, any app that has access to the TCP stack can track, would it be possible to create something that sits between the TCP stack and all the apps, designed to grant (granular) access?
If so, the UI I'm imagining is similar to Privacy Badger -- it shows a list of attempts to track and gives the user individual control of which ones to allow. Basically putting a nice face on the manual process that you suggest.
(Score: 3, Informative) by EETech1 on Sunday November 26 2017, @10:30PM
https://github.com/M66B/XPrivacy [github.com]
(Score: 2) by chromas on Sunday November 26 2017, @10:43PM
You can try AdblockPlus [adblockplus.org]. It acts as a local proxy and can take the same filter lists the browser privacy extensions use.
(Score: 2) by bob_super on Wednesday November 29 2017, @07:41PM
NoRoot firewall [google.com] is the simplest (but not guaranteed comprehensive) answer I found on Android.
It creates a VPN to force all network traffic through itself, and asks you who you want to allow.