Free Android apps are have a bite light . That , at least , is the conclusion of a grouping of security research worker , who find that ill vetted apps on Google Play are connecting to a massive phone number of ad and trailing site — without users being any the wiser .

While Apple rigorously vet everything that appears in its app store , Google Play is much more open , only omit apps that are obviously malicious . Many of us enjoy the dotty west app environs Google has cultivated , but a wider quality ambit can leave way for apps that play tight and loose with their drug user . That ’s why security system investigator at Eurecom in France have conduct a monumental sweep oar of devoid apps , monitoring the sites they colligate to unbeknownst to their users . MIT Tech Review describe their late field :

Vigneri and co begin by download over 2,000 destitute apps from all 25 categories on the Google sport depot . They then launched each app on a Samsung Galaxy SIII run Android version 4.1.2 that was set up to transfer all dealings through the team ’s host . This recorded all the universal resource locator that each app attempted to contact .

Dji Drone

Next they compare the universal resource locator against a list of known ad - relate sites from a database called EasyList and a database of drug user trailing situation call EasyPrivacy , both roll up for the open beginning AdBlock Plus labor . last , they counted the number of matches on each list for every app .

All in all , the 2,000 apps in question connected to a banging 250,000 universal resource locator across almost 2,000 top - level domains . Most of these apps were modest offender , only trying to unite to a smattering of ad or tracking sites , but roughly ten percentage of the apps studied unite to over 500 different URL . ( Unsurprisingly , 9 out of the 10 most oft contacted advertising - related land are run by Google . ) Top offenders include “ Music Volume EQ , ” which colligate to over 2,000 distinct urls , and Eurosport Player , which hook up with 810 different user - trailing sites .

Thankfully , the researchers are also working on a solution : A new Android app , call “ NoSuchApp ” that monitor outgoing traffic from a user ’s earphone , bring out just which external sites your apps are essay to contact . Keep an eye out for NoSuchApp in the Google Play memory board — this NSA , at least , promises it wo n’t sight on you . [ MIT Tech Review ]

Ms 0527 Jessica Jones Daredevil Born Again

Read the full written report onarXiv .

AndroidGoogleGoogle PlaySecurity

Daily Newsletter

Get the estimable tech , skill , and finish tidings in your inbox daily .

News from the time to come , delivered to your present tense .

You May Also Like

Amazon Arzopa

Sonos Speaker Move 2

Apple2025macbookairm4

Second Screen Portable 15 Monitor

Hp 17 Touchscreen Laptop

How To Watch French Open Live On A Free Channel

Dji Drone

Ms 0527 Jessica Jones Daredevil Born Again

Amazon Arzopa

Sonos Speaker Move 2

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06

Motorbunny Buck motorized sex saddle review