Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

iOS Social Apps Leak Contact Data

Some apps send iPhone address books in unencrypted format to software vendors' servers--a practice that may not be obvious to all users.

10 Top iOS 5 Apps
10 Top iOS 5 Apps
(click image for larger view and for slideshow)
Are your iOS applications sharing your personal information with software vendors?

Wednesday, Arun Thampi, a Ruby and iOS developer, said that he'd discovered that a favorite iOS app, Path--billed by its developer as "the smart journal that helps you share life with the ones you love"--was sending an unencrypted copy of his iPhone address book to Path's servers.

"I'm not insinuating that Path is doing something nefarious with my address book, but I feel quite violated that my address book is being held remotely on a third-party service," said Thampi in a blog post. "I love Path as an iOS app and I think there are some brilliant people working on it, but this seems a little creepy."

The same day, Dave Morin, Path's CEO, responded to Thampi by commenting on his blog post. "We actually think this is an important conversation and take this very seriously," said Morin. "We upload the address book to our servers in order to help the user find and connect to their friends and family on Path quickly and [efficiently] as well as to notify them when friends and family join Path. Nothing more."

Furthermore, said Morin, Path recently made such sharing "opt-in" for the Android version of its client, and said that it would do the same beginning with the 2.0.6 version of its iOS software, which is waiting for App Store approval from Apple.

[ Google researcher argues that social media actually enhances personal privacy. Read more at Google Study: Social Media Enhances Privacy. ]

Inspired by Thampi's post, iOS developer Mark Chang posted to his "more of the same" blog that he'd found similar behavior on the part of another iOS social app, Hipster, which is billed by its developer as "a fun way to share where you are and what you're doing."

"I looked at the apps on my own iPhone for information leakage by other apps," Chang said. "I figured this would be common practice, and lo and behold, when booting up Hipster, it seems like parts of my iPhone address book were being uploaded to Hipster."

In a comment added to Chang's post, meanwhile, "nitrofox" reported that a photo app with social capabilities, Instagram, demonstrated similar behavior. Although as another poster commented, this behavior is noted in the app's FAQ, which states that allowing the app to "find friends" then uploads all contacts "via a secure connection in order to locate your contacts' accounts on Instagram." The FAQ also said, "We currently do not store this information."

According to Chester Wisniewski, a senior security advisor at Sophos Canada, multiple iOS apps are clearly failing to detail exactly what they're doing, and he criticized Morin at Path in particular for pursuing a "have-all-of-your-contact-info-first-and-ask-permission-second" strategy.

The problem is furthermore compounded because, unlike Android, the permission system built into iOS devices "doesn't provide notification of what information an app may be sending to its keepers, aside from location information," said Wisniewski in a blog post. "Where was Apple when the original app was released? The lengthy approval process should be looking out for its customers, not just whether it allows you to tether."

We aren't suggesting these companies are going to use this information against your interests, but should they be collecting this information without your knowledge?" Wisniewski continued. "Additionally, insecurely transporting personal information from your phone book, permission or not, is an unacceptable practice."

Social media are generating tons of data, but that data only becomes truly valuable when examined in context. Attend the virtual Enterprise 2.0 event Social Analytics: The Bridge To Business Value, and learn how social analytics will provide the bridge to unlocking business value. It happens Feb. 16.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.