Thursday, February 24, 2011

Security shocker: Android apps send private data in clear • The Register

Security shocker: Android apps send private data in clear

by Dan Goodin, theregister.co.uk
February 24th 2011 12:31 AM

Cellphones running the Android operating system fail to encrypt data sent to and from Facebook and Google Calendar, shortcomings that could jeopardize hundreds of millions of users' privacy, a computer scientist says.

In a simple exercise for his undergraduate security class, Rice University professor Dan Wallach connected a packet sniffer to his network and observed the traffic sent to and from his Android handset when he used various apps available for Google's mobile platform. What he saw surprised him.

The official Facebook app, for instance, transmitted everything except for the password in the clear, Wallach blogged on Tuesday. This meant that all private messages, photo uploads and other transactions were visible to eavesdroppers, even though the account had been configured to use Facebook's recently unveiled always-on SSL encryption setting to prevent snooping over insecure networks.

“People for right or wrong treat Facebook as something that's more personal and private,” Wallach told The Reg. “With Facebook, we never saw a password going back and forth, but there was unencrypted traffic, which is interesting because I've set my Facebook web client to use their new SSL-all-the-time feature. But that does't reflect onto the Facebook app on Android.”

A Facebook spokesman said: “After launching SSL for the site we are still testing across all Facebook platforms, and hope to provide it as an option for our mobile users in the coming months.” The company warns users to exercise caution when using unsecured Wi-Fi networks, but as far as we can tell, Facebook has never explicitly said its smartphone app fails to encrypt traffic.

Google Calendar showed a similar carelessness in Wallach's experiment by also sending and receiving data in the clear. That makes it possible for snoops to see your schedule when the service is accessed on unsecured networks.

A Google spokesman said in an email: “We plan to begin encrypting traffic to Google Calendar on Android in a future maintenance release. When possible, we recommend using encrypted WiFi networks.” He didn't say how long users would have to wait.

Wallach found a few other apps that took a cavalier approach to user privacy. The SoundHound song-recognition app, for instance, transmits the user's GPS coordinates down to the street block to the service each time a request is made, even though the app works just fine without that information. A service called ShopSaavy tracks the same details, but at least with that app, the argument can be made that the user's physical location is relevant to the service.

None of the apps Wallach tested transmitted passwords in the clear.

Shortly after Wallach published his findings, F-Secure researcher Sean Sullivan blogged about yet another shortcoming in Facebook's SSL offerings. Based on his experiences, it appears rogue Facebook apps can disable the feature. ®

Original Page: http://www.theregister.co.uk/2011/02/24/android_phone_privacy_shocker/

Shared from Read It Later

Sent from my iPad | ross | ross@button.ca 

No comments:

Post a Comment