Apps like Candy Crush and Tinder have taken app misuse to another level, as these Android and iOS apps use their advertising systems in order to seek out location information for the user without them knowing and without consent. The information is probably sold to Gravy Analytics, a location data brokerage which owned Venntel, a company exposed for selling such information to American police departments.
According to the findings of the 404 Media investigation, the collection of this data is carried out using RTB technology which is the way advertisers are able to place ads in mobile applications.. Again, most times users do not have to be aware of this as data brokers capture the location, without the app developers interfering. Security specialists state that users still do not notice this spying, as the applications themselves are not aimed at gathering or transmitting such information.
Sensitive Sites Under Siege
The compilation of data appears to have gone beyond game and dating applications such as temple run and grindr to include health, religious, and gps apps, amassing a staggering over thirty million location points from the white house, the kremlin , vatican as well as multiple military bases This data leak is concerning in the case of a user due to the amount of applications the terms encompass, ranging from everyday health apps to even vpn’s which promote privacy to the active user.
This is one of the major breaches which security specialists came across, and are considering to be a monumental mess The example Zach Edwards pointed out was one of the few cases where proof existed of billboards vandalizing user data by streams of ad bids, instead of app codes. This has bought immense controversy, primarily after the Federal Trade Commission (FTC) placed a fine of $750 000 on Gravy Analytics and Venntel.
How to Defend Yourself From Possible Data Leak
Smartphone users should check the permissions and private policy that an application mandates before its installation. Android phones can be set not to be given permissions such as location or camera unless explicitly required, whereas I phone can set the ‘Ask Apps Not To Track’ option which limits the tracking and data harvesting occurring.
Firstly, this case at hand reflects out to us the important lesson that there is an emerging requirement for stricter data protection regulations along with an increased vigilance on the part of the users of the applications. Conceivably the vast majority of the applications installed are not detrimental in nature but isolated dangers of ad based data hoarding makes the case for responsibility in the application ecosystem.
--Advertisement--