iOS and Android Apps found to be leaking sensitive user information

Amid growing concerns of smartphones being exploited to leak sensitive user’s data, a research from the Massachusetts Institute of Technology (MIT), Harvard, and Carnegie-Mellon has revealed that mobile apps are leaking user’s information to the third parties in a massive proportion.


These third parties are nobody but the advertisers who use user’s personal information such as behavioral data, search terms, and location data to understand and predict their buying behavior.

Android most damaging, iOS close second

Researchers at MIT tested 110 popular, free apps – half of them Android and half iOS. These tests were carried out on the top 5 most popular apps from the Google Play Store in the categories of Business, Games, Health & Fitness, and Travel & Local. Similarly for Apple’s App Store, they tested the top five from categories such as Business, Games, Health & Fitness, and Navigation.

The results that came out were nothing less than shocking. A staggering 73% of the tested Android apps were found to be leaking user’s email address with the third parties while 47% of the Apple store apps were found to be leaking geo-coordinates and other location data with the third parties.

The research also stated that  51 out of 55 Android apps connect to a mysterious domain, The purpose could not be verified, but is likely due to a background process of the Android phone.

Researchers mentioned,

“It may be a background connection being made by the Android operating system; thus we excluded it from the tables and figures in order to avoid mis-attributing this connection to the apps we tested. The relative emptiness of the information flows sent to indicate the possibility of communication via other ports outside of HTTP not captured by mitmproxy”.

Why Information leak could be leathal

Suggesting how information leaking apps are posing a great risk to user’s sensitive data, the research described following as the most concerning,

  • An app may share a unique [ID] related to a device such as a System ID, SIM card ID, IMEI, MEID, MAC address, UDID, etc. The ID can be used to track an individual.
  • An app can request user permission to access device functions and potentially personal or sensitive data, with the most popular requests being access to network communications, storage, phone calls, location, hardware controls, system tools, contact lists, and photos & videos.
  • Some apps practice over-privileging, where the app requests permissions to access more data and device functions than it needs for advertising and data collection.
  • Any data collected by the app may be sent to a third party, such as an advertiser.
  • A user may have a hard time understanding permission screens and other privacy tools in a device’s operating system.

Windows Phone, the 3rd most used mobile platform after iOS and Android, has certainly been found to be the safest bet among its compatriots. Although MIT’s research did not mention if Windows Phone apps are leaking user’s info, statistics from ReCon, a cross-platform system that shows PII leaks by inspecting network traffic, shows that only one Windows app sent PII to trackers over an SSL (Secure Sockets Layer).

Posted by with Tags
Ankit Gupta is a writer by profession and has more than 7 years of global writing experience on technology and other areas. He follows technological developments and likes to write about Windows & IT security. He has a deep liking for wild life and has written a book on Top Tiger Parks of India.


  1. These third parties are nobody but the advertisers who use user’s personal information such as behavioral data, search terms, and location data to understand and predict their buying behavior.

  2. none

    This is pure FUD to defend a failed operating system with few useful apps. The lack of useful apps of course has other benefits: lack of malware and data leaks. Windows Phones are slightly better than dumbphones. If they were an actual smartphone with a mature app ecosystem, there would be plenty of dataleaks and such.

Leave a Reply

Your email address will not be published. Required fields are marked *

7 + 3 =