User privacy data crawled by mobile application

Source: Internet
Author: User
Keywords Smartphone Internet data

At 3.15, when parties were extremely concerned about a sensitive data on the privacy of mobile users, a small study conducted by the Dcci Internet Data Center revealed that nearly 66.9% of smartphone mobile apps are crawling user privacy data, up to 34.5% Mobile applications have a "privacy deviant" behavior--the nature of excessive cross-border crawling, in the case of no relationship with its own function, access to the smart phone users of SMS records, call records, contacts and other private personal information; These crawl behaviors are not necessary for the application service function provided by the relevant mobile Apps to the user. Many users do not know that, even if they know that there is no way.

The DCCI 2013 Mobile Privacy Assessment Report, conducted by Apps, the top 1400 downloads of China's Android market, shows that 53.1% of mobile apps have the right to read location information, ranking first in the main goal of accessing privacy information for mobile users, The second is to access the contact person (21.2%), read the call record (18.1%), call (14.7%), send a text message (14.7%), read the SMS record (11.9%), get the local number (8.1%), collect user behavior (4.2%), etc.

Report shows: Call history, SMS record, Address Book is the privacy information disclosure of the three high-risk zones: mobile applications with read call recording behavior, up to 73.1% of the Cross-border crawl, that is, users in the use of the application of the service function process, there is no need and will not use this call record acquisition function, These mobile apps are constantly crawling users ' call logs. The mobile applications with the ability to read short message recording 61.1% of the SMS records for Cross-border crawl, access to contact book contacts this privacy rate of 38%, access to the number of the deviant ratio of up to 60.5%.

Cross-border reading location information, learning, the theme beautification, social intercourse, tool class mobile application is more serious; cross-border access to contact information, in the business office, life, photography and video applications are more serious; cross-reading of call logs is more prevalent in social, commercial and travel applications; business, transportation maps, games, finance, Health applications are more serious in reading SMS records. In the above application categories, health, standard mobile applications do need to invoke the relevant permissions for the user service, but there are quite a number of mobile applications of the privacy data information reading is really the normal function of the service does not need.

360 security guards, Tencent mobile phone butler, Security Butler, Trustgo, LBE, Moan guards, etc. for the security cooperation Evaluation enterprise. The relevant security enterprises at the seminar said that the popularity of the speed is very fast, the user is very large, and the user on the application of smart phone issues not enough knowledge, especially on the protection of security privacy How many people do not understand, even if the security software has been prompted, Users may not be able to follow the prompts timely and appropriate protection of their privacy information is not stolen. In addition, because of the technology, the operating system itself, if the smartphone does not get superuser admin rights through Root, the user itself cannot terminate the crawling behavior of the various mobile applications that have been installed for sensitive privacy data.

DCCI Workshop data show that only 20% of Android phones have superuser admin rights after Root. In other words, for most users without Root, even if they know their own privacy is crawled, but also helpless, and many of the applications have been preloaded to delete also deleted, only brush machine solution, but the brush machine market is more irregular, all kinds of dark channels, forced bundle installation, Through the Trojan program, and so on secretly constantly forcibly to users to install new applications, pop-up ads ... Just out of the den, frying.

is privacy on Android phones safe and secure on the iPhone? According to foreign mobile application Security Service provider appthority latest data: The most popular IOS platform applications leak user information more than the most popular Android apps.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.