Popular articles

10/26/2010

IPhone survey shows nearly Qicheng application disclosure privacy

Apple is good, can leak badly. Recently, an iPhone application on the 68% leakage of privacy information in a number of professional forums to be stir-fried. Which in the end how is it? - Hundreds of thousands of application software, free software a lot, fans are having all the fun it. However, American University, Associate Director of Information Security and network, network security expert Eric Smith, has released a survey report. The report shows that 68% of the most popular free iPhone application, will reveal the user's privacy. Now, with the popularity of smart machines, the widespread use of free software users, which caused the privacy leak prevention and there is no clearly defined legal issues.

Can not not believe:

68% of the free iPhone software will reveal Privacy

Maybe you play was going on, "an angry bird," or other free software is out Landlords "publish" your personal information - this is not sensational. According to Eric Smith, research group found that in the iPhone application store in the "most popular" and "the most popular free applications," among these two types of applications, 68% of the software will send out separate identification number (UDID), and did not implement encryption. In addition, 18% of the applications implemented in the communication process is encrypted, so the researchers could not determine whether these applications have to send ID.

The report, the independent identification code "is closely related with the users personal information", which is likely to be hidden leak. Smith, a total of 57 models of iPhone applications have been studied and found in order to send messages in plain text form, which contains a user personal data, there is a potential security risk.

It is reported that Apple's independent identification code is used for each section of equipment assigned iOS system identification code, these devices include the iPhone, iPad, and iPod touch. Independent of the application identifier is to prevent the application of software applications on the shop used to be pirated.

Not this one:

There alleged leakage of private products Android applications

The report also showed that many Android applications will be popular without the user permission disclose the user's location, phone number and other personal information. At the same time, send the iPhone ID independent R & D company involved in wide range of applications, including Amazon, Chase Bank, Target and Sam's Club stores and other corporate giants. CBS News developed a higher security risk application, the user starts the program will not only send a separate identification number, will send the user real name.

Smith says that most developer of iPhone applications are all the way through the collection of ID data on the implementation of the independent remote control, some of which is the ability to get the user identity data. For example, Amazon's application will be used for user login ID user name and equipment sent in plain text mode, the network listener can easily match the two. However, this statement has not been confirmed by Amazon.

Intelligent machine users are worried that the ads for these phones become common practice, and with precise positioning data released gradually become a trend in advertising, "related companies can easily collect the browser status, application usage and location, and even the names and other information, and advertisers sell. "

Reality and the Law:

Current users is difficult to protect their legitimate rights and interests

Disclosure of user privacy incidents are not uncommon, Intel Pentium 3 chip installed in the processor serial number (Processor Serial Number) on the "privacy theft has triggered a frenzy", which Smith questioned why the iPhone application does not fully consider these issues .

But in fact, Apple has also taken some measures to minimize the existence of which iOS device security risks. If the user uses the application contains a GPS or a mailing address and other personal information, the program will automatically request user approval, otherwise the application can not proceed. Apple Developer agreement states: "do not allow the device ID and user accounts open link." Apple CEO Steve Jobs (Steve Jobs) has said recently, application developers should allow users to "clear understanding of their data will be used for what purpose. "

"However, conscious of the reality of relying on vendors, how much or let the user worry. Because the law is still far behind the development of mobile Internet. The user is difficult exactly to protect their rights." Yuan lawyer said Guangzhou. The intelligent machine players is recommended, users download and install as much as possible through legal channels, application software can not be traced back to avoid losses.

However, there are users that do not care, just as the ATM spit out money, like to have this hack does not mean that everyone can master it, privacy, how could this kind of thing does not leak, unless you do not go on without communication, or certainly there are ways to find you.

Apple is good, can leak badly. Recently, an iPhone application on the 68% leakage of privacy information in a number of professional forums to be stir-fried. Which in the end how is it? - Hundreds of thousands of application software, free software a lot, fans are having all the fun it. However, American University, Associate Director of Information Security and network, network security expert Eric Smith, has released a survey report. The report shows that 68% of the most popular free iPhone application, will reveal the user's privacy. Now, with the popularity of smart machines, the widespread use of free software users, which caused privacy and legal issues prevent leaks no clearly defined.

Can not not believe:

68% of the free iPhone software will reveal Privacy

Maybe you play was going on, "an angry bird," or other free software is out Landlords "publish" your personal information - this is not sensational. According to Eric Smith, research group found that in the iPhone application store in the "most popular" and "the most popular free applications," among these two types of applications, 68% of the software will send out separate identification number (UDID), and did not implement encryption. In addition, 18% of the applications implemented in the communication process is encrypted, so the researchers could not determine whether these applications have to send ID.

The report, the independent identification code "closely associated with the user personal information", which is likely to be hidden leak. Smith, a total of 57 models of iPhone applications have been studied and found in order to send messages in plain text form, which contains a user personal data, there is a potential security risk.

It is reported that Apple's independent identification code is used for each section of equipment assigned iOS system identification code, these devices include the iPhone, iPad, and iPod touch. Independent of the application identifier is to prevent the application of software applications on the shop used to be pirated.

Not this one:

There alleged leakage of private products Android applications

The report also showed that many Android applications will be popular without the user permission disclose the user's location, phone number and other personal information. At the same time, send the iPhone ID independent R & D company involved in wide range of applications, including Amazon, Chase Bank, Target and Sam's Club stores and other corporate giants. CBS News developed a higher security risk application, the user starts the program will not only send a separate identification number, will send the user real name.

Smith says that most developer of iPhone applications are all the way through the collection of ID data on the implementation of the independent remote control, some of which is the ability to get the user identity data. For example, Amazon's application will be used for user login ID user name and equipment sent in plain text mode, the network listener can easily match the two. However, this statement has not been confirmed by Amazon.

Intelligent machine users are worried that the ads for these phones become common practice, while the use of precise positioning data released gradually become a trend in advertising, "related companies can easily collect the browser status, application usage and location, and even the names and other information, and advertisers sell. "

Reality and the Law:

Current users is difficult to protect their legitimate rights and interests

Disclosure of user privacy is not rare events, the Intel Pentium 3 chip installed in the processor serial number (Processor Serial Number) on the "privacy theft has triggered a frenzy", which Smith questioned why the iPhone application does not fully consider these issues .

But in fact, Apple has also taken some measures to minimize the existence of which iOS device security risks. If the user uses the application contains a GPS or a mailing address and other personal information, the program will automatically request user approval, otherwise the application can not proceed. Apple Developer agreement states: "do not allow the device ID and user accounts open link." Apple CEO Steve Jobs (Steve Jobs) has said recently, application developers should allow users to "clear understanding of their data will be used for what purpose. "

"However, conscious of the reality of relying on vendors, how much or let the user worry. Because the law is still far behind the development of mobile Internet. The user is difficult exactly to protect their rights." Yuan lawyer said Guangzhou. The intelligent machine players is recommended, users download and install as much as possible through legal channels, application software can not be traced back to avoid losses.

However, there are users that do not care, just as the ATM spit out money, like to have this hack does not mean that everyone can master it, privacy, how could this kind of thing does not leak, unless you do not go on without communication, or certainly there are ways to find you.

1 条评论:

  1. Nice blog !! i also know a very good site for mobile application development apps.cybertech(.)com !!!

    回复删除

Search this Blog