Mobile
Commentary
12/20/2010
00:08 AM
Ed Hansberry
Ed Hansberry
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

You Have Little Control With Smartphone App Privacy

People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.

People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.Users on a PC have access to firewalls, cookie blockers and rich browser settings that can aid them in remaining at least somewhat anonymous, though everyone should know once you connect your machine to the internet, you lose total anonymity immediately.

Smartphones, however, don't have those same tools. Even if they did, they wouldn't really help. For example, a firewall that blocked an app from phoning home would likely render the app useless as so many apps are dependant on online connections that connect to their home server. Think Facebook, Pandora, Twitter, 4Square and more.

The Wall Street Journal has analyzed 101 Android and iPhone apps and found that 56 of them transmitted the unique device ID of the phone back to various companies, including those that specialize in advertising. Pandora was one of the worst.

Testers found that Pandora sent information to eight different tracking companies. It sent the phone's location to seven of them, the device's ID to three of them and demographic data to two of them. Do you recall giving Pandora permission to do that? No? I didn't think so.

Even apps that shouldn't require much if any online access share information. Bejeweled 2 sends your user ID and password back to the application creator and the same info plus your phone number to third parties.

Don't count on Apple or Google to monitor this for you. Apple contends that apps cannot send user data without the user's express permission, but when confronted with these apparent violations, Apple clammed up. Google took the approach that if you don't want to let an app send data about you, just don't install the app.

For a detailed report on what the 56 apps disclose, see this page. Will that cause you to uninstall any of those apps, or not buy them in the first place?

Comment  | 
Print  | 
More Insights
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.