Do you think you are being watched? While you are thinking about the answer, we recall that virtually every of your actions on the Internet is passively monitored. An average web page shares data with dozens of developers. The same can be said of many mobile applications. Some of them even collect confidential information, including your location and data about calls made. Various businesses and even event organizers use Bluetooth and WiFi to monitor people nearby. Retailers have resorted to using face recognition technologies to identify customers and make them personal promotional offers. Moreover, representatives of private companies can share the information received with law enforcement agencies.
- 1 Free cheese happens only in a mousetrap
- 2 How to understand that data is being collected without warning?
- 3 Illusion of control
- 4 How to keep data confidential?
Free cheese only happens in a mousetrap
Today, many pay attention to news aboutleakage of personal data of users of social networks, banks and other online platforms. But what about mobile apps? Despite the fact that their requests do not always violate confidentiality, one way or another, their use is fraught with risk. The fact is that applications often require access to all kinds of information on mobile devices. If you want to post photos to Facebook, the app must access your photo library. If you need real-time traffic updates, the application will request access to your location. Speech-to-text programs request access to the microphone. But this does not mean that they use access to listen to your conversations (although the Facebook application did just that). However, some applications want to access other features of mobile devices that have nothing to do with the operation of the application itself. This applies to requests for access to the camera’s flash equipment and location data. The information received is then sold to ad networks.
Do you want to always be up to date with news from the world of science and high technology? Subscribe to our channel in Yandex.Zen
So, thanks to criticism from Apple and Google,which in the past allowed data leaks, steps were taken to prevent unauthorized access to device functions and to better inform users about what information installed applications have access to. According to BuzzFeed News, some applications are requesting location access to provide users with better, personalized information. At the same time, without mentioning that they sell data or use it to target ads. Recently, New York Times reporters found that one of the popular applications sent user location data to 40 different companies, while users believed that their location was tracked only to obtain weather forecasts.
See also: 419 million records from the Facebook database found in the public domain
How to understand that data is being collected without warning?
Free applications usually downloadtrackers - after all, developers must somehow make money. At the same time, users should not rely on the fact that such applications will not collect their data.
Tracker - A mobile app analytics system with the ability to track the source of installations.
Results of a studyemployees of the International Computer Science Institute, showed that paid versions of applications often have the same trackers as their free counterparts. Researchers believe that we are entering an era when you cannot be sure that if you pay for the application, it will not gain access to personal data. Games are often considered one of the most invasive applications, not to mention the fact that they are often designed or specifically designed for children who should be protected in accordance with privacy laws designed specifically for children. Experts advise you to carefully study the resolution of gaming applications before installation.
Before downloading applications thatrequest access to functions that have nothing to do with the service provided, scientists advise thinking twice. However, it will be even better if you decide to learn more directly about the developer. So, if you do not want the Chinese government to potentially have access to your data, you will be interested to know that TikTok belongs to a Chinese company. Representatives of TikTok claim that the company does not store user data in China and does not share this information with the government. Also, FaceApp application is based in Russia, however, its developers said that they do not store user data in the country. In turn, Vkontakte representatives assure the public that they do not provide personal data of users to law enforcement agencies, however, the number of criminal cases due to posts on this social network indicates the opposite. So it’s up to you to decide whether to trust such companies.
Do you pay attention to whichinformation do mobile applications request access? Share your opinion with the participants of our Telegram chat and at the same time find out what applications are used by readers of Hi-News.ru
Researchers also recommend periodically.Check your phone’s settings to see which applications have access to personal information. Recently, Apple and Android devices have begun to tell users what features of the application are requesting access to, whether it has been granted, and whether their decision can be changed.
The illusion of control
Among the specialists who studycollection of personal data, it is widely believed that requesting applications for access to personal data is just an illusion of control. Often applications find other ways to get the information they’re looking for, including location data. They can also use data that does not require permission, such as unique device identifiers that allow applications to collect data about how and when they are used. The resulting information then goes to advertisers, allowing them to improve their products and increase sales. But how else do they use personal data?
Surely you have often heard stories about hacks anduse of personal data. Recently, Facebook and Twitter announced that the personal data of hundreds of users were in the public domain. The reason was the requirement for some Android applications downloaded from the Google Play store to enter account information. The companies received a security report, according to which a software development kit called One Audience provides third-party developers with access to personal data such as email addresses, usernames and even the latest tweets. It is possible that someone could gain control of someone else’s Twitter account, but there is no evidence to date.
It’s also difficult to call applications transparentFacebook and Snapchat, as a large number of users regularly complain about privacy violations. However, the saddest thing is that we can not do anything about it. It remains only to boycott the application if you do not like it or completely refuse to use some social networks. In this case, most likely, in the future the problem of confidentiality of personal data will become much more serious.
How to keep data confidential?
I think no one will argue with what peoplethere must be a right to know what information about them is collected and what they are doing with it. The situation in which private corporations process the personal data of users without their informed consent is simply unacceptable. Nevertheless, almost every day we see that companies are not going to regulate work with user data, as they are primarily driven by the desire to make a profit. Moreover, many companies go even further: when users give permission to use personal data, applications charge an additional fee or reduce the quality of service. Therefore, they should be held responsible for the misuse of confidential data.