Feeds

Microsoft stops ID-ing phones in jab at Google

Redmond jettisons unique device identifiers

Beginner's guide to SSL certificates

Microsoft will stop identifying specific mobile devices that use its location-tracking services, a change that differentiates its Windows Phone 7 from Google's competing Android operating system.

Under a new policy, outlined in a letter (PDF) sent to members of Congress on Monday, Microsoft has already stopped storing and using unique identifiers collected from devices that use Windows location services to pinpoint nearby coffee shops or get driving directions. What's more, devices running a forthcoming Windows update will no longer send the identifiers to the company's location service at all.

“We believe that, when designed, deployed and managed responsibly, the location-based feature of a mobile operating system should function as a tool for the user and the applications he or she elects to use, and not as a means to generate a database of sensitive information that can enable a party to surreptitiously 'track' a user,” Andy Lees, president of Microsoft's mobile communications business, wrote. “Without a unique identifier, or some other significant change to our operating system or practices, we cannot track an individual device.”

Lees made many of the same points in a recent blog post.

The change comes as Congress and privacy advocates scrutinize similar location services offered by phones running Google and Apple OSes. As previously reported, when Android phones have location services enabled, they collect the MAC address, signal strength and GPS coordinates of every wireless network they see and zap it to Google servers, along with the unique ID of the handset.

Android handsets also send a unique ID when transmitting cell tower information. These events happen several times an hour, according to independent researcher Samy Kamkar.

By combining the locations and the unique identifier collected several times a day every single day, it wouldn't be hard for Google – or someone subpoenaing Google – to figure out where a user lives and works. And since Android phones track the signal strength of each Wi-Fi network they see, there's a good chance the data could be used to learn the MAC address of a user's home and business routers.

Microsoft, Google, and Apple phones all store the locations of nearby Wi-Fi networks and cell towers so that location services consume less battery power and work in areas where satellite signals aren't available. Much of the recent hoopla over location services started last month, when researchers disclosed that iPhones often stored a “scary” amount of this data and allowed it to be transferred unencrypted to users' computers. Apple eventually changed this practice.

Apple has said the file is compiled only when location services are enabled on the iPhone, but Kamkar has said the locations were stored even when the service was turned off.

For Google's part, the locations of Wi-Fi and cell towers are cached by Android phones only when location services are turned on, and data is regularly deleted to prevent it from storing too large a list. The company has said it anonymizes the location data it collects.

But so far Google has showed no signs that it plans to curb the collection of unique identifiers, making it the only one of the three mobile OS providers to do so, Kamkar said. ®

Update

A Google spokeswoman emailed us to say that it's not accurate to say the company collects a "unique identifier" from phones that share location data with the company. She cited written testimony submitted this week to Congress that states the following:

Google is also very careful about how we use and store the data that is generated by location-based services. The location information sent to Google servers when users opt in to location services on Android is anonymized and stored in the aggregate and is not tied or traceable to a specific user. The collected information is stored with a hashed version of an anonymous token, which is deleted after approximately one week.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
Disturbance in the force lets phones detect gestures with Wi-Fi
These are the movement detection devices you're looking for
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.