Saturday February 29, 2020
Home Lead Story Popular Datin...

Popular Dating Apps Including Tinder Share User Data With Dozens of Companies

The apps were chosen for the study as they were the most popular apps on Google Play at the time in "certain categories where sensitive category personal data were deemed likely to be processed, such as data about health, religion, children, and sexual preferences"

0
//
Tinder
The apps tested include the dating apps Grindr, Happn, OkCupid, and Tinder; the period tracker apps Clue and MyDays; the makeup app Perfect; the religious app Muslim: Qibla Finder; the children's app My Talking Tom 2; and the keyboard app Wave Keyboard. Pixabay

Ten popular apps, including dating apps like Tinder, OKCupid and Grindr, have been found sharing people’s personal information with dozens of digital marketing and ad tech companies without users’ knowledge, according to a new study.

The only way for many users to protect their information, the study conducted by the Norwegian Consumer Council (NCC) says, is for them to have never installed the apps at all.

The apps tested include the dating apps Grindr, Happn, OkCupid, and Tinder; the period tracker apps Clue and MyDays; the makeup app Perfect; the religious app Muslim: Qibla Finder; the children’s app My Talking Tom 2; and the keyboard app Wave Keyboard, ZDNet reported on Wednesday.

The study took into consideration the activity of 10 popular apps during the period June to November 2019 in order to identify how personal data is transmitted from these apps to commercial third parties.

Tinder
Ten popular apps, including dating apps like Tinder, OKCupid and Grindr, have been found sharing people’s personal information with dozens of digital marketing and ad tech companies without users’ knowledge, according to a new study. Wikimedia Commons

The apps were chosen for the study as they were the most popular apps on Google Play at the time in “certain categories where sensitive category personal data were deemed likely to be processed, such as data about health, religion, children, and sexual preferences”.

ALSO READ: 20% Mid-Range Smartphones To Support 5G in 2020: Tech Report

Only the Android versions of these apps were tested, with NCC explaining that this was due to Android being the largest mobile operating system worldwide, in addition to Google being a key player in the ad tech industry, the report added. (IANS)

Next Story

Cyber Attackers May Use Ultrasonic Waves To Activate Siri, Google on Your Smartphone

These waves, the researchers found, can propagate through many solid surfaces to activate voice recognition systems and -- with the addition of some cheap hardware -- the person initiating the attack can also hear the phone's response

0
Hackers
The new research from Washington University in St. Louis expands the scope of vulnerability caused by hackers that ultrasonic waves pose to cellphone security. Pixabay

Ultrasonic waves do not make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger – without the phone owner’s knowledge, suggests a new research.

Researchers have previously shown that ultrasonic waves can be used to deliver a single command through the air. However, the new research from Washington University in St. Louis expands the scope of vulnerability that ultrasonic waves pose to cellphone security.

These waves, the researchers found, can propagate through many solid surfaces to activate voice recognition systems and — with the addition of some cheap hardware — the person initiating the attack can also hear the phone’s response.

The results were presented at the Network and Distributed System Security Symposium in San Diego. “We want to raise awareness of such a threat,” said Ning Zhang, Assistant Professor of at the McKelvey School of Engineering. “I want everybody in the public to know this.”

Zhang and his co-authors were able to send “voice” commands to cellphones as they sat inconspicuously on a table, next to the owner. With the addition of a stealthily placed microphone, the researchers were able to communicate back and forth with the phone, ultimately controlling it from afar. Ultrasonic waves are sound waves in a frequency that is higher than humans can hear. Cellphone microphones, however, can and do record these higher frequencies.

“If you know how to play with the signals, you can get the phone such that when it interprets the incoming sound waves, it will think that you are saying a command,” Zhang said. To test the ability of ultrasonic waves to transmit these “commands” through solid surfaces, the research team set up a host of experiments that included a phone on a table.

Attached to the bottom of the table was a microphone and a piezoelectric transducer (PZT), which is used to convert electricity into ultrasonic waves. On the other side of the table from the phone, ostensibly hidden from the phone’s user, is a wave form generator to generate the correct signals. The team ran two tests, one to retrieve an SMS (text) passcode and another to make a fraudulent call.

The first test relied on the common virtual assistant command “read my messages” and on the use of two-factor authentication, in which a passcode is sent to a user’s phone — from a bank, for instance — to verify the user’s identity. The attacker first told the virtual assistant to turn the volume down to Level 3. At this volume, the victim did not notice their phone’s responses in an office setting with a moderate noise level.

Voice Search
Ultrasonic waves do not make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger – without the phone owner’s knowledge, suggests a new research. Pixabay

Then, when a simulated message from a bank arrived, the attack device sent the “read my messages” command to the phone. The response was audible to the microphone under the table, but not to the victim.

In the second test, the attack device sent the message “call Sam with speakerphone,” initiating a call. Using the microphone under the table, the attacker was able to carry on a conversation with “Sam.” The team tested 17 different phone models, including popular iPhones, Galaxy and Moto models. All but two were vulnerable to ultrasonic wave attacks.

ALSO READ: India is The Bright Spot For HP Inc in Asia-Pacific Region, Says Top Company Executive

Ultrasonic waves made it through metal, glass and wood. Zhang said there is a simple way to keep a phone out of harm’s way of ultrasonic waves: the interlayer-based defence, which uses a soft, woven fabric to increase the “impedance mismatch.” In other words, put the phone on a tablecloth. (IANS)