Feeds

University boffins build snoop-spotting snitch app

Mobile tool detects when apps are pulling location data

Combat fraud and increase customer satisfaction

University researchers have developed a smartphone app to show users how often their mobile software tracks their movements.

The team from Rutgers University said that the their Android tool uses a real-time monitoring system to show exactly when an application pulls locational information and transmits it. The results, they say, were eye-opening for many users.

"Our results confirm that the Android platform’s location access disclosure method does not inform participants effectively," the team wrote. "Almost all participants pointed out that their location was accessed by several apps they would have not expected to access their location."

To track the information, the researchers created a tool which logs and reports requests for access to user location information such as current and previous locations. When the application seeks permission to access the data, the research tool would inform users via an alert.

While many Android applications provide various ways of informing the user of locational tracking, such as the presence of a menu icon, the researchers argue that their tool demonstrates that many users do not properly notice or understand what the icons mean.

To prove their point, the Rutgers team offered results of a campus experiment which placed users with the tracking notification software against Android users without the tool. Results of the test, they say, showed that the users with the alert tool were better informed about application tracking behaviors and were more likely to understand how individual apps were handling their data.

That the additional tools are needed to properly understand what applications are doing is an indictment of the way Android handles locational tracking, say the researchers.

"Our work confirms the existing research literature that Android permissions are not an effective method for disclosing and consenting for location data access," the Rutgers team said of its findings.

"Our results showed that the existing location access disclosure mechanism on the Android platform, the flashing GPS icon, was not effective to inform users of apps’ location accesses. Nearly all participants in the two groups had some apps they did not expect to access their location."

The team hopes that the work will serve as an eye-opener to both users and developers about the need for better privacy management and reporting tools. They noted that in addition to better reporting of tracking access, users should be offered additional controls on when and how their mobile applications can access their locational data.

Combat fraud and increase customer satisfaction

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.