Skip to Content

Your Apps Could Be Leaking Private Info

Many apps collect and share sensitive data, and the developers may not even realize it.
August 2, 2010

A study of iPhone and Android apps has revealed that many of these programs secretly collect and transmit users’ personal information.

The App Genome Project, launched by the mobile security company Lookout, analyzed every app available through Apple’s App Store and Google’s Android Market. Developers must disclose an app’s functionality when they submit an app to either store. Apple performs its own review before making an app downloadable.

Lookout researchers scanned more than 300,000 mobile applications and performed a deeper analysis of about a third of them. The project revealed that many developers do not disclose an app’s data-harvesting behavior in their descriptions. But this may not be deliberate–developers often include third-party software components in their apps without vetting that component’s behavior, the researchers say.

A significant number of the applications studied were found to do something that the developer hadn’t disclosed. For example, a third of all free iPhone apps attempted to access the user’s geographic location. For the Android platform, about 29 percent of free apps tried to access location data. At least 8 percent of all free Android apps and 14 percent of all free iPhone apps tried to access a user’s list of contacts as well. Both the iPhone OS and Android issue warnings to users when an application wants to access sensitive information. But the warning doesn’t tell the phone’s owner what data the app wants to collect, or where it might send it.

The researchers found that one Android app that lets users change the background on their phone also sends the device’s phone number and other user-specific information to a server in China.

“Mobile apps are doing a lot of things that people would not expect,” says Lookout CEO John Hering. He adds that third-party software components often collect information without warning developers. “End users and developers have very little idea what is happening in the applications they are using and writing.”

The App Genome Project found that about 47 percent of Android apps and 23 percent of free iPhone apps include some third-party code. These “application frameworks” make it easier to build an app, but can make a finished app do things the developer didn’t intend. “A lot of this leakage of information is not because the developer wanted it there, but because the application frameworks put it there,” says Hering.

Trevor Hawthorn, managing principal of the software assurance firm Stratum Security, says many app developers don’t know how to check whether third-party code is malicious or not. For example, Hawthorn has found that some gaming apps collect location information in a way that can be used to track players as they move around a city or across the country. This is possible, says Hawthorn, simply because most developers know the concepts of software security without knowing the specifics. “When they integrate third-party software into their app,” Hawthorn says, “very rarely do they perform an application security assessment or code review. Attackers know this.”

Lookout researchers say that third-party components can introduce software vulnerabilities that attackers could use to take control of a phone. “Apple and Google are doing a great job trying to keep these platforms secure, but that does not mean anything if the developers are introducing vulnerabilities using third-party development kits,” Hering says.

It’s difficult for update third-party software, so vulnerabilities may persist for longer, says Hawthorn. “We saw the same thing when the Internet took off, peer-to-peer file sharing, wireless, social networking, cloud, and now mobile,” he says. “Only after the security community starts to poke at it do we start to figure out the security and privacy [implications] of technology.”

Keep Reading

Most Popular

This new data poisoning tool lets artists fight back against generative AI

The tool, called Nightshade, messes up training data in ways that could cause serious damage to image-generating AI models. 

Rogue superintelligence and merging with machines: Inside the mind of OpenAI’s chief scientist

An exclusive conversation with Ilya Sutskever on his fears for the future of AI and why they’ve made him change the focus of his life’s work.

The Biggest Questions: What is death?

New neuroscience is challenging our understanding of the dying process—bringing opportunities for the living.

Driving companywide efficiencies with AI

Advanced AI and ML capabilities revolutionize how administrative and operations tasks are done.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.