No application is really free; it is always paid from either yours or somebody else's pocket.
You pay for paid apps; advertisers (usually) pay for free apps. Last year's explosion of cheap Android phones brought to Market many people who are not willing or able to pay for application. Logical solution for developers was to introduce in-applications ads, but now iOS owners would like some stuff for free, thank you. With ads came privacy issues.
Showing posts with label security. Show all posts
Showing posts with label security. Show all posts
Monday, April 2, 2012
Thursday, March 29, 2012
Worst of Both Worlds
In the recent article about zero day exploits brokers, I found something that surprised me a bit: iOS exploits are better paid than Android ones. iOS is a closed source operating system; although it is harder to learn about its inner workings, it is also harder to fix it quickly. On the other hand, Android is based on Linux, which is open source; hundreds of eyes are looking at potential security holes in code and new versions are "released early, released often". OS should be as fortress and exploits should be rare and expensive, but it is quite opposite.
Tuesday, February 28, 2012
What privacy?
Feeling naked in front of ad providers? |
That's what I wrote couple of days ago as preparation for one article. And then the reality caught me.
British Sunday Times published, as some say, typical tabloid article about Android Facebook application with excessive rights; it can read your text messages and snap a snapshot of your surroundings whenever it likes (article is not free, so check this). Facebook opposed these claims fiercely. Not going into discussion what they really did or didn't do with the data, this scenario is perfectly plausible. Be it Android or iOS, once you allow certain permission, application can use it at its own discretion until you uninstall it (Android) or revoke the permission (iOS).
Monday, February 27, 2012
Permissions Scientific Way
If we put together everybody's 2 cents about improvement of iOS permissions from both visual and logical perspective, it would be huge pile of money. My 2 cents included. However, some people actually did some hard work to figure out how good is the current approach and what could be done to improve it.
University of California, Berkeley has Securtiy Research Lab, and that lab runs Smartphone Security project. These gals and guys took problem very seriously and made very interesting publication titled "The Effectiveness of Application Permissions" (don't be repelled by its dull scientific formatting). Key part is analysis of permissions of almost thousand Android applications and thousand Chrome plugins, trying to discover how permissions are used in the real world. I'll stick to the Android part.
University of California, Berkeley has Securtiy Research Lab, and that lab runs Smartphone Security project. These gals and guys took problem very seriously and made very interesting publication titled "The Effectiveness of Application Permissions" (don't be repelled by its dull scientific formatting). Key part is analysis of permissions of almost thousand Android applications and thousand Chrome plugins, trying to discover how permissions are used in the real world. I'll stick to the Android part.
Tuesday, February 21, 2012
Disinfected for Your Convenience
Social application Path took contacts data impolitely, without asking first.
We know that because somebody snooped unencrypted data, but it was almost OK because it is social application. There are some others applications that did the same. What we don't know is how many application with totally unsocial purpose passed App Store's manual checks and sent data somewhere encrypted without being detected.
We know that because somebody snooped unencrypted data, but it was almost OK because it is social application. There are some others applications that did the same. What we don't know is how many application with totally unsocial purpose passed App Store's manual checks and sent data somewhere encrypted without being detected.
Subscribe to:
Posts (Atom)