Skip to Content

Your Apps Could Be Leaking Private Info

Many apps collect and share sensitive data, and the developers may not even realize it.
August 2, 2010

A study of iPhone and Android apps has revealed that many of these programs secretly collect and transmit users’ personal information.

The App Genome Project, launched by the mobile security company Lookout, analyzed every app available through Apple’s App Store and Google’s Android Market. Developers must disclose an app’s functionality when they submit an app to either store. Apple performs its own review before making an app downloadable.

Lookout researchers scanned more than 300,000 mobile applications and performed a deeper analysis of about a third of them. The project revealed that many developers do not disclose an app’s data-harvesting behavior in their descriptions. But this may not be deliberate–developers often include third-party software components in their apps without vetting that component’s behavior, the researchers say.

A significant number of the applications studied were found to do something that the developer hadn’t disclosed. For example, a third of all free iPhone apps attempted to access the user’s geographic location. For the Android platform, about 29 percent of free apps tried to access location data. At least 8 percent of all free Android apps and 14 percent of all free iPhone apps tried to access a user’s list of contacts as well. Both the iPhone OS and Android issue warnings to users when an application wants to access sensitive information. But the warning doesn’t tell the phone’s owner what data the app wants to collect, or where it might send it.

The researchers found that one Android app that lets users change the background on their phone also sends the device’s phone number and other user-specific information to a server in China.

“Mobile apps are doing a lot of things that people would not expect,” says Lookout CEO John Hering. He adds that third-party software components often collect information without warning developers. “End users and developers have very little idea what is happening in the applications they are using and writing.”

The App Genome Project found that about 47 percent of Android apps and 23 percent of free iPhone apps include some third-party code. These “application frameworks” make it easier to build an app, but can make a finished app do things the developer didn’t intend. “A lot of this leakage of information is not because the developer wanted it there, but because the application frameworks put it there,” says Hering.

Trevor Hawthorn, managing principal of the software assurance firm Stratum Security, says many app developers don’t know how to check whether third-party code is malicious or not. For example, Hawthorn has found that some gaming apps collect location information in a way that can be used to track players as they move around a city or across the country. This is possible, says Hawthorn, simply because most developers know the concepts of software security without knowing the specifics. “When they integrate third-party software into their app,” Hawthorn says, “very rarely do they perform an application security assessment or code review. Attackers know this.”

Lookout researchers say that third-party components can introduce software vulnerabilities that attackers could use to take control of a phone. “Apple and Google are doing a great job trying to keep these platforms secure, but that does not mean anything if the developers are introducing vulnerabilities using third-party development kits,” Hering says.

It’s difficult for update third-party software, so vulnerabilities may persist for longer, says Hawthorn. “We saw the same thing when the Internet took off, peer-to-peer file sharing, wireless, social networking, cloud, and now mobile,” he says. “Only after the security community starts to poke at it do we start to figure out the security and privacy [implications] of technology.”

Keep Reading

Most Popular

The Steiner tree problem:  Connect a set of points with line segments of minimum total length.
The Steiner tree problem:  Connect a set of points with line segments of minimum total length.

The 50-year-old problem that eludes theoretical computer science

A solution to P vs NP could unlock countless computational problems—or keep them forever out of reach.

section of Rima Sharp captured by the LRO
section of Rima Sharp captured by the LRO

The moon didn’t die as early as we thought

Samples from China’s lunar lander could change everything we know about the moon’s volcanic record.

conceptual illustration of a heart with an arrow going in on one side and a cursor coming out on the other
conceptual illustration of a heart with an arrow going in on one side and a cursor coming out on the other

Forget dating apps: Here’s how the net’s newest matchmakers help you find love

Fed up with apps, people looking for romance are finding inspiration on Twitter, TikTok—and even email newsletters.

ASML machine
ASML machine

Inside the machine that saved Moore’s Law

The Dutch firm ASML spent $9 billion and 17 years developing a way to keep making denser computer chips.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.