We order pizza, play games, we publish on Facebook or
We are surfing the internet – we love our smartphones and always share
with them all our joys and sorrows. We value them as well as their
incredible usefulness, for example, when Google Now in the morning
inform you of a traffic jam and chased away from home earlier than usual. It
all in all, however, is a little scary: how
actually people with Google knows where I live and where I work?
What do they know about me, operators of all other applications and what
Indeed they do with the data?
Motion Mamut for months
These are questions no one has found a clear answer.
especially since Google and other companies are on this rather low
talkative. That’s about right for Computer World: the ongoing
many months of research and testing editors traced the footsteps
Data from smartphones and determined who receives many sent
secret data packets. Support for this mammoth project called
Online Safety Institute gave Specialist
School of Gelsenkirchen.
For test purposes Computer World had to provide experts
the ability to track all data streams. Several factory
New smartphones were equipped with specialist
software for logging the entire transfer. This is what has happened
later, exactly the same happens also to our
Android devices – and in similar form also in phones
with other operating systems like iOS.
Computer World for the first time shows
like a big appetite for data to our smartphones
Rafal
Kaminski , Deputy ed. In chief. Computer World
Even during the setup process control software was in
lab lot of work, because preinstalled applications immediately
begun sending out the identifying characteristics of, inter alia,
Android ID, after which you can recognize any device or number
Serial phone (IMEI) and built-in Wi-Fi module (address
MAC).
This information will form the foundation for any subsequent collection
data, applications or because the manufacturers of corporate advertising in each
now can recognize any smartphone and its owner.
Trap privileges
After the first test configuration, install various popular
applications that are on many phones. Whenever
Android display pop-ups asking if the application can receive
access to this and other data. If you do not agree,
it is impossible to install and use applications – all or
nothing. A subsequent withdrawal of allowances program, for example,
address book is extremely difficult. On the test smartphone
Computer World has identified approximately 200 preinstalled applications
and services, all with their own privileges. A strange thing:
corporate applications do not have to ask for permission -
All are simply already allocated . A protocol
proves that if several applications from the same
the manufacturer, the apps also make available to all
rights.
More Privacy
Google is changing its system of allowances: in the new version of Android
“M” applications must ask permission when they want to use
contacts or calendar. In the interim version for developers
it works pretty well.
Start harvesting
When the smartphone is configured, all the necessary applications
They are installed and the device – such as smartphones Test – is
intensively used, its data collection becomes more
more extensive and more valuable. In the end smartphone hits
more and more personal information, and these reveal tastes,
friends and places visited by the user .
The device getting news and images, and Google right away
loads captured photos to your own cloud. Hardly anyone is blocking.
because they are associated with this great features, like auto shows
slides and collages, but also the ability to very easily indication on
pictures of your friends and their names. In this way, Google takes a very
quickly recognize their faces and identities.
Facebook also is an urgent collector
Google is indeed the central point of each debate
about privacy, but the company is by no means the only
data collector. The German Institute for Internet Security
took a magnifying glass, among others, Facebook application: portal
Community is making a copy of your address book and captures
also informed about important from the point of view of safety
system settings, including time switch
Phone .
Facebook is indeed one of the biggest collectors of data
applications, but also other popular programs busily gathering
information. Especially connection with advertising networks makes
Application tireless gatherer. User data is transmitted
to advertising companies, such as Flurry, Opera or Yahoo.
The deal with the data provider application receives money from the network
advertising – apparently so much money, that much popular
the application is available in the Google Play store for free. In
If you loved the giveaway game Crossy Road Test
They found that application sends user data to 15
different servers! Although Google – at least
officially – for advertising purposes, lets you use only ID
The user’s Crossy Road intercepts are other features
Identification. Despite Google pay attention app is further
in his shop.
Top Data
Although the data stack may seem completely random, it’s for
ad networks the information provided is at a premium.
Androidowy smartphone finds and sends information about Wi-Fi networks
in the area. In conjunction with data from the GPS they allow for
much more accurate user location and display it
Ads relevant to the whereabouts . On
Based on data from Wi-Fi coarse location it is entirely possible
without GPS. And what’s whereabouts is
missing puzzle with which you can squeeze a lot of information.
Other data, like list of installed applications, address book
or calendar entries, create a detailed user profile. Them
more accurate the information, the more accurately Facebook
Google, Flurry and all other ad networks can be selected and
show ads. For this reason, many ad networks you buy
Additional data from other networks. They can easily synchronize with
own resources: in the end have a unique ID
the device.
pigeonholing
At the end of the algorithm assigns the identified device and
Users drawer, the so-called personas . Industry
Advertising knows them more than 100. These fictitious persons stereotypes
specific groups, such as cat lovers or maniacs sport.
If you want to refer to a specific group of people, for example,
single, kociarz, athletic , an advertising company must
only to find a common set of specific personas.
This policy has sometimes strange fruit: US network
Target stores sent a young woman to the house unsolicited
products for children. Parents with which the woman lived first
Target filed a complaint, but later the woman had to admit
unsuspecting parents that she is pregnant. They betrayed her
consumer behavior – were typical for pregnant women.
Stop the surveillance
Do you know it all, not at all to use your smartphone?
Of course! But let’s be aware that data which news services
We pass. Does not endorse any question unthinkingly
the application!
“You can also read:
CBA bought software for surveillance
Smartphones
photo. bizoon | 123RF
No comments:
Post a Comment