Wednesday, August 26, 2015

Spying smartphone. What we know about Android? – PC World

We order pizza, play games, we publish on Facebook or
 We are surfing the internet – we love our smartphones and always share
 with them all our joys and sorrows. We value them as well as their
 incredible usefulness, for example, when Google Now in the morning
 inform you of a traffic jam and chased away from home earlier than usual. It
 all in all, however, is a little scary: how
 actually people with Google knows where I live and where I work?
 What do they know about me, operators of all other applications and what
 Indeed they do with the data?

Motion Mamut for months

These are questions no one has found a clear answer.
 especially since Google and other companies are on this rather low
 talkative. That’s about right for Computer World: the ongoing
 many months of research and testing editors traced the footsteps
 Data from smartphones and determined who receives many sent
 secret data packets. Support for this mammoth project called
 Online Safety Institute gave Specialist
 School of Gelsenkirchen.

For test purposes Computer World had to provide experts
 the ability to track all data streams. Several factory
 New smartphones were equipped with specialist
 software for logging the entire transfer. This is what has happened
 later, exactly the same happens also to our
 Android devices – and in similar form also in phones
 with other operating systems like iOS.

Computer World for the first time shows
 like a big appetite for data to our smartphones

 rkaminski.jpg Rafal
 Kaminski
, Deputy ed. In chief. Computer World

Even during the setup process control software was in
 lab lot of work, because preinstalled applications immediately
 begun sending out the identifying characteristics of, inter alia,
 Android ID, after which you can recognize any device or number
 Serial phone (IMEI) and built-in Wi-Fi module (address
 MAC).

  This information will form the foundation for any subsequent collection
 data, applications or because the manufacturers of corporate advertising in each
 now can recognize any smartphone and its owner.

Trap privileges

After the first test configuration, install various popular
 applications that are on many phones. Whenever
 Android display pop-ups asking if the application can receive
 access to this and other data. If you do not agree,
 it is impossible to install and use applications – all or
 nothing. A subsequent withdrawal of allowances program, for example,
 address book is extremely difficult. On the test smartphone
 Computer World has identified approximately 200 preinstalled applications
 and services, all with their own privileges. A strange thing:
  corporate applications do not have to ask for permission -
 All are simply already allocated
. A protocol
 proves that if several applications from the same
 the manufacturer, the apps also make available to all
 rights.

More Privacy

1.jpg

Google is changing its system of allowances: in the new version of Android
 “M” applications must ask permission when they want to use
 contacts or calendar. In the interim version for developers
 it works pretty well.

Start harvesting

When the smartphone is configured, all the necessary applications
 They are installed and the device – such as smartphones Test – is
 intensively used, its data collection becomes more
 more extensive and more valuable. In the end smartphone hits
 more and more personal information, and these reveal tastes,
 friends and places visited by the user
.

The device getting news and images, and Google right away
 loads captured photos to your own cloud. Hardly anyone is blocking.
 because they are associated with this great features, like auto shows
 slides and collages, but also the ability to very easily indication on
 pictures of your friends and their names. In this way, Google takes a very
 quickly recognize their faces and identities.

Facebook also is an urgent collector

Google is indeed the central point of each debate
 about privacy, but the company is by no means the only
 data collector. The German Institute for Internet Security
 took a magnifying glass, among others, Facebook application: portal
 Community is making a copy of your address book and captures
 also informed about important from the point of view of safety
 system settings, including time switch
 Phone
.

  Facebook is indeed one of the biggest collectors of data
 applications, but also other popular programs busily gathering
 information. Especially connection with advertising networks makes
 Application tireless gatherer. User data is transmitted
 to advertising companies, such as Flurry, Opera or Yahoo.

The deal with the data provider application receives money from the network
 advertising – apparently so much money, that much popular
 the application is available in the Google Play store for free. In
 If you loved the giveaway game Crossy Road Test
 They found that application sends user data to 15
 different servers!
Although Google – at least
 officially – for advertising purposes, lets you use only ID
 The user’s Crossy Road intercepts are other features
 Identification. Despite Google pay attention app is further
 in his shop.

Top Data

Although the data stack may seem completely random, it’s for
 ad networks the information provided is at a premium.
 Androidowy smartphone finds and sends information about Wi-Fi networks
 in the area. In conjunction with data from the GPS they allow for
 much more accurate user location and display it
 Ads relevant to the whereabouts
. On
 Based on data from Wi-Fi coarse location it is entirely possible
 without GPS. And what’s whereabouts is
 missing puzzle with which you can squeeze a lot of information.

Other data, like list of installed applications, address book
 or calendar entries, create a detailed user profile. Them
 more accurate the information, the more accurately Facebook
 Google, Flurry and all other ad networks can be selected and
 show ads. For this reason, many ad networks you buy
 Additional data from other networks. They can easily synchronize with
 own resources: in the end have a unique ID
 the device.

pigeonholing

At the end of the algorithm assigns the identified device and
 Users drawer, the so-called personas . Industry
 Advertising knows them more than 100. These fictitious persons stereotypes
 specific groups, such as cat lovers or maniacs sport.
 If you want to refer to a specific group of people, for example,
  single, kociarz, athletic , an advertising company must
 only to find a common set of specific personas.

This policy has sometimes strange fruit: US network
 Target stores sent a young woman to the house unsolicited
 products for children. Parents with which the woman lived first
 Target filed a complaint, but later the woman had to admit
 unsuspecting parents that she is pregnant. They betrayed her
 consumer behavior – were typical for pregnant women.

Stop the surveillance

Do you know it all, not at all to use your smartphone?
 Of course! But let’s be aware that data which news services
 We pass. Does not endorse any question unthinkingly
 the application!

“You can also read:
 CBA bought software for surveillance
 Smartphones

photo. bizoon | 123RF

LikeTweet

No comments:

Post a Comment