Feeds

Pandora's mobile app transmits 'mass quantities' of user data

From Android's lips to advertisers' ears

Remote control for virtualized desktops

A free smartphone app provided by internet radio service Pandora supplies advertisers with enough user information for them to compile detailed snapshots of those who use it, researchers who analyzed the software have said.

Tuesday's report, titled Mobile Apps Invading Your Privacy and issued by software analysis firm Veracode, found that Pandora's app tracked users' age, sex, zip code and precise geographic location, which in many cases was updated in a continuous loop. The app then sent such information to servers operated by advertising services including AdMarvel and AdMob. Other information that was shared included the phone's device ID and the user's birth date.

The report follows Monday's revelation that federal prosecutors are investigating whether smartphone apps have been illegally collecting information about handset users without proper disclosures. Pandora has said it received a subpoena in the matter and believes other app providers have, as well.

If Veracode's findings are correct, they could provide plenty of fodder to investigators.

“It means your personal information is being transmitted to advertising agencies in mass quantities,” Veracode's Tyler Shields wrote.

He continued:

In isolation some of this data is uninteresting, but when compiled into a single unifying picture, it can provide significant insight into a person's life. Consider for a moment that your current location is being tracked while you are at your home, office, or significant other's house. Couple that with your gender and age and then with your geolocated IP address. When all that is placed into a single basket, it's pretty easy to determine who someone is, what they do for a living, who they associate with, and any number of other traits about them. I don't know about you, but that feels a little Orwellian to me.

A spokeswoman for the California-based company declined to comment until after a pending initial public offering is completed.

The report focused solely on Pandora's app for phones running Google's Android operating system. It found that the app is bundled with code libraries offered by five services, which in addition to AdMarvel and AdMob, include comScore, Google.Ads, and Medialets.

Pandora's audience has doubled to more than 80 million listeners, thanks to the popularity of its iPhone app, USA Today reported in January. Veracode's report made no reference to that app, presumably because of the closed nature of Apple's iOS. ®

This story was updated to reflect Veracode's reporting that personally identifiable information is sent to AdMarvel and AdMob. According to the report, comScore receives hashed information.

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.