App Rights or wrongs ? A look at smartphone apps or: why RTFM* is not just important for geeks and “computer types” * = Read The F+*#ing (or “Fine”) Manual.

Slides:



Advertisements
Similar presentations
Little Big Brains: Mobile Application Production by: Jose, Francis, Xuong.
Advertisements

What is an application?. An application is... An application (or app) is a type of software that allows you to perform specific tasks! Applications for.
Don’t be bullied, or be a bully.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Skype – Safe, Secure and Legal Tony Brett Deputy Head of Information and Support Group Head of IT Support Staff Services Oxford University Computing Services.
Mobile Applications: Changes in social networking and mobile phones By Elias Chesy.
Android 4.0 ICS An Unified UI framework for Tablets and Cell Phones Ashwin. G. Balani, Founder Member, GTUG, Napur.
Trends in computing- Mobile phones
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Onetouch Cloud Backup.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
How the Internet Works Jon Crowcroft,
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Shala Sylvester, Dejah Sanford, Stephanie Hicks, Tierra Beason.
System Components Hardware overview for Apollo ACS.
Scams Stevie's Scam School videos
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Confidential Company Internal396/ LXE Uen PA2Xperia Transfer Mobile Communication Material Company Internal396/ LXE.
Tang Hall Primary School E - Safety Support for parents.
Android 5.0 “Lollipop” Eric Moore Computer Users Group of Greeley February 14, 2015.
Technology at Your Finger Tip….or your Ear? Phones as Mobile Devices.
Sparky + The Next Generation College Mobile Solution Ruoyang Zhang ENG 302 Class Project All rights reserved 08/06/2014.
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Enhancing User Privacy on Android Devices Bachelor of Computer Science (Honours) Name: Quang Do Supervisor: Raymond Choo Associate Supervisor: Ben Martini.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
ESCCO Data Security Training David Dixon September 2014.
Three steps to sell Office Always ask every customer the following questions to get them interested in buying Office: Did you know that Office.
Going Mobile with MobileMana Get a great mobile website solution today!
Modes of Communication © 2015 albert-learning.com.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
VMS PUSH for Marketing. Imagine a way to communicate your messages with more expression and feeling than ever before. Something that could.
Social Media Roundup Bad social media: 7 Ways to lose your audience.
GPS (Global Positioning System). Allows you to share your location in real time and locate your friends using smartphones and GPS.
Once posted, other YouTube users can post comments about the video, post their YouTube video responses, or rate the video. Videos that are uploaded to.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Windows 10 & Office 2016 Presented By: Cody Pierson & Patrick Wall.
Protecting Yourself on Social Media – Friend Requests And Messages.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
IS3320 Developing and Using Management Information Systems Lecture 17: Data-Flow Diagrams 2 – the case of Shazam Rob Gleasure
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
Dextrosoft SCHEDULED PHONE BACKUP Backup your mobile life Version Copyright © 2015 Dextrosoft Private Limited. All Rights Reserved.
 Follow the steps in order to solve the sync issue with the best fitness trackers;best fitness trackers  1. Reboot your Fitness Tracker and the device.
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Android and IOS Permissions Why are they here and what do they want from me?
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Facebook privacy policy
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Mobile Application Development
Software Chapter 11.
ALL ABOUT USING YOUR ANDROID DEVICE
AirDrop Not working issue on MacBook Pro, iMac & iOS 11
WIFI Mobile Video Door Phone Product Specification
Everything you wanted to know but were afraid to ask a 10-year-old.
LO2 – Understand Computer Software
MyLion Registration Website | Mobile device
Presentation transcript:

App Rights or wrongs ? A look at smartphone apps or: why RTFM* is not just important for geeks and “computer types” * = Read The F+*#ing (or “Fine”) Manual 1

What I’ll speak about today 1.What are app rights and permissions - the good, the bad and the *OMG* !!!11 2.An overview of Rights (on Android) 3.Why you no RTFMP !?! (read the f…. permissions) 4.Can I haz Cheeseburger Your Phone Contacts? Weighing off risk vs. return. 5.Why you no RTFMT&C !?! (read the f… terms & conditions) 6. All your BaseEverything Are Belong To UsUSA! 7.Helppp!! 2

App rights (also called: permissions) – A horrible beauty we’ve made… Every smartphone is a miniature computer with sensors (GPS, gyrometres, etc)  On the internet we all speak English Chinese French TCP/IP *  Many of the vulnerabilities of TCP on a computer apply also to smartphones  But infinitely worse are unreasonable permissions you grant to apps App rights are not evil from birth – they are limits to what apps can or cannot do →Rights allow software to access either the hardware features of a phone, such as the camera, a user’s personal information (calendar, contacts) or the phone’s GPS coordinates This way information, can be combined with automatic actions. THAT. IS. Beautiful… But if you give too many rights, it’s possible you give away too much about yourself Really nasty, if wrong information is cross-referenced * Sometimes also UDP 3

Android OS – Permissions 1/2 4

Android OS – Permissions 2/2 5

Urgh… that’s a lot of rights 6

Before you install: read your rights - do they match the use you think you’ll have for the app? So much “FAIL” that one facepalm just isn’t enough… 7

After you install an app: limit rights – you are in control So much “FAIL” that one facepalm just isn’t enough… 8

Exercise 1 – Spot the potentially dishonest app 9

Does your mother know… … as much about you, as Facebook, Skype and Twitter do? 10

Let’s zoom in 11

Feeling a bit queasy? Good. ‘Cause there’s more. 12

Knowing your Rights? Not enough – The example of the SpotifySpytify Terms & Conditions “ With your permission, we may collect information stored on your mobile device, such as contacts, photos or media files.” “We may also collect information about your location based on, for example, your phone's GPS location or other forms of locating mobile devices (e.g Bluetooth). We may also collect sensor data (e.g., data about the speed of your movements, such as whether you are running, walking, or in transit).” “We may share information with advertising partners in order to send you promotional communications about Spotify or to show you more tailored content, including relevant advertising for products and services that may be of interest to you, and to understand how users interact with advertisements. The information we share is in a de-identified format (for example, through the use of hashing) that does not personally identify you.” WTF? From Spotify’s first try at new Terms & Conditions: So much “FAIL” that one facepalm just isn’t enough… 13

Okay. So who else wants my data? 14

The Government. It has you. Because Internet. 15

The Government. It has you. Because Internet. 16

Ok. Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaargh! So what do I do? Check those app permissions If several apps available with the same function, choose the one with fewer rights If an app is for free, it´s likely your data is the true price you pay Read the f+*#ing permissions! Read the Terms & Conditions (and the Privacy Statement, if there is one) Learn how the company behind the app says it will use your data Keep an eye out for changes to the Terms & Conditions Read the f+*#ing conditions! Lock down rights/permissions On iOS: go to Settings > Privacy and turn off as much as you can Yes, give up on a few comforts On Android: consider “CyanogenMod” to limit app access rights Shame privacy violators on the social networks It´s your internet. If you don´t say “no”, the default is “take all my data already!” “The Government” knows maybe. If you let it. 17

Ok. Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaargh! So what do I do? Use open-source apps and Encrypt! Encrypt! Encrypt! This, strictly speaking, has nothing to do with app rights/permisssions But is important to protect your privacy DITCH YOUR STANDARD APPS!!! Go to (plus: consider Text Secure / Signal for IM) Go to Come back to Privacy Salon Vulnerabilities in apps or protocols are discovered daily App Rights, T&Cs or shareholdings (!) can change But most importantly 18

One Last Thing 19

A word about that fingerprint reader… 20

A word about that fingerprint reader 21

A word about that fingerprint reader 22

Thank You 23