Tuesday, July 16, 2024
EHA

Google’s Pixel & Apple’s iPhone Track & Transmit Telemetry Data, Despite The User Explicitly Opting Out – New Report

The data and the information of the users obtained by both Google on Android smartphones and Apple on iPhones have been in question for a long time. 

Recently, a study which is conducted by Douglas Leith of Trinity College has revealed that Google and Apple transmit telemetry data, notwithstanding the user explicitly opts out.

That’s why there are many users who literally try to limit this data to the maximum and watch for ways to prevent smartphones from monitoring and being able to learn more about us.

The amount of data that both the companies collect from users with different methods has been taken into account, and it passes from the phone to the databases of both companies without us being able to do practically anything to prevent it. 

In the maximum number of cases, they are not relevant data, but still, we are already part of a large amount of data globally.

Google collects 20 times more data than Apple

The study by Douglas Leith shows that how Google is capable of receiving data from smartphones even without having logged in with a Google account. While Apple also has access to the users’ data but, when it boasts privacy, they do so for some reason when compared to Android smartphones.

In both cases, iPhone and Android phones collect data from apps and the system itself; here, the most interesting thing is that both of them has the ability to obtain the when the smartphone is completely inactive. 

In short, our smartphones are constantly being monitored, even if it does not have access to a Wi-Fi or mobile data connection.

Amount of data Google and Apple collect

While in the case of Google, it collects up to 1MB of data from Chrome, YouTube, Google Docs, the clock or even the message app as well. And in the case of Apple, it gets around 42KB to 52KB of the data from Siri, Safari, iCloud, and it’s a really notable difference as compare to Google.

When the smartphones remain at idle state or inactive, Google’s Android continue to collect up to 1 MB of user data in every 12 hours. At the same time, Apple collects about 42 KB to 52 KB of data in every 12 hours. 

So, if we compare this data with the volume of users present in a country like the United States, then we will find more than 1 TB of data in every 12 hours from Google and in the case of Apple, only 5 GB of data.

Google acts against this report

Google informed after this investigation was revealed that the data that is obtained by them is essential to keep their software (Android OS) updated and verify that everything works precisely. 

Even Google also asserted that methodologically it’s not ethical and appropriate. Still, Google once again insisted that the data obtained by them is essential to keep the Android OS updated and work properly.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles