Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Sunday November 26 2017, @07:57PM   Printer-friendly
from the anyone-remember-privacy? dept.

A new Free and Open-Source project called "Exodus" scans Android apps and already has found many advertising trackers:

"Researchers at Yale Privacy Lab and French nonprofit Exodus Privacy have documented the proliferation of tracking software on smartphones, finding that weather, flashlight, rideshare, and dating apps, among others, are infested with dozens of different types of trackers collecting vast amounts of information to better target advertising.

Exodus security researchers identified 44 trackers in more than 300 apps for Google's Android smartphone operating system. The apps, collectively, have been downloaded billions of times. Yale Privacy Lab, within the university's law school, is working to replicate the Exodus findings and has already released reports on 25 of the trackers.

Yale Privacy Lab researchers have only been able to analyze Android apps, but believe many of the trackers also exist on iOS, since companies often distribute for both platforms. To find trackers, the Exodus researchers built a custom auditing platform for Android apps, which searched through the apps for digital "signatures" distilled from known trackers. A signature might be a tell-tale set of keywords or string of bytes found in an app file, or a mathematically-derived "hash" summary of the file itself.

The findings underscore the pervasiveness of tracking despite a permissions system on Android that supposedly puts users in control of their own data. They also highlight how a large and varied set of firms are working to enable tracking."

The statement by Yale Privacy Lab summarizes the situation, and the story has seen coverage by Cory Doctorow and Le Monde. Private search engine Qwant has removed trackers in its app and Protonmail is under fire.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Interesting) by Anonymous Coward on Sunday November 26 2017, @09:56PM (3 children)

    by Anonymous Coward on Sunday November 26 2017, @09:56PM (#601851)

    OK, same AC, thanks for the lesson. I'll double-down on my ignorance!

    If, as you say, any app that has access to the TCP stack can track, would it be possible to create something that sits between the TCP stack and all the apps, designed to grant (granular) access?

    If so, the UI I'm imagining is similar to Privacy Badger -- it shows a list of attempts to track and gives the user individual control of which ones to allow. Basically putting a nice face on the manual process that you suggest.

    Starting Score:    0  points
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   1  
  • (Score: 3, Informative) by EETech1 on Sunday November 26 2017, @10:30PM

    by EETech1 (957) on Sunday November 26 2017, @10:30PM (#601861)
  • (Score: 2) by chromas on Sunday November 26 2017, @10:43PM

    by chromas (34) Subscriber Badge on Sunday November 26 2017, @10:43PM (#601863) Journal

    You can try AdblockPlus [adblockplus.org]. It acts as a local proxy and can take the same filter lists the browser privacy extensions use.

  • (Score: 2) by bob_super on Wednesday November 29 2017, @07:41PM

    by bob_super (1357) on Wednesday November 29 2017, @07:41PM (#603129)

    NoRoot firewall [google.com] is the simplest (but not guaranteed comprehensive) answer I found on Android.
    It creates a VPN to force all network traffic through itself, and asks you who you want to allow.