Feeds

Security shocker: Android apps send private data in clear

Facebook's persistent SSL isn't

The Essential Guide to IT Transformation

Cellphones running the Android operating system fail to encrypt data sent to and from Facebook and Google Calendar, shortcomings that could jeopardize hundreds of millions of users' privacy, a computer scientist says.

In a simple exercise for his undergraduate security class, Rice University professor Dan Wallach connected a packet sniffer to his network and observed the traffic sent to and from his Android handset when he used various apps available for Google's mobile platform. What he saw surprised him.

The official Facebook app, for instance, transmitted everything except for the password in the clear, Wallach blogged on Tuesday. This meant that all private messages, photo uploads and other transactions were visible to eavesdroppers, even though the account had been configured to use Facebook's recently unveiled always-on SSL encryption setting to prevent snooping over insecure networks.

“People for right or wrong treat Facebook as something that's more personal and private,” Wallach told The Reg. “With Facebook, we never saw a password going back and forth, but there was unencrypted traffic, which is interesting because I've set my Facebook web client to use their new SSL-all-the-time feature. But that does't reflect onto the Facebook app on Android.”

A Facebook spokesman said: “After launching SSL for the site we are still testing across all Facebook platforms, and hope to provide it as an option for our mobile users in the coming months.” The company warns users to exercise caution when using unsecured Wi-Fi networks, but as far as we can tell, Facebook has never explicitly said its smartphone app fails to encrypt traffic.

Google Calendar showed a similar carelessness in Wallach's experiment by also sending and receiving data in the clear. That makes it possible for snoops to see your schedule when the service is accessed on unsecured networks.

A Google spokesman said in an email: “We plan to begin encrypting traffic to Google Calendar on Android in a future maintenance release. When possible, we recommend using encrypted WiFi networks.” He didn't say how long users would have to wait.

Wallach found a few other apps that took a cavalier approach to user privacy. The SoundHound song-recognition app, for instance, transmits the user's GPS coordinates down to the street block to the service each time a request is made, even though the app works just fine without that information. A service called ShopSaavy tracks the same details, but at least with that app, the argument can be made that the user's physical location is relevant to the service.

None of the apps Wallach tested transmitted passwords in the clear.

Shortly after Wallach published his findings, F-Secure researcher Sean Sullivan blogged about yet another shortcoming in Facebook's SSL offerings. Based on his experiences, it appears rogue Facebook apps can disable the feature. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.