Wednesday, November 13, 2024
HomeCyber Security NewsGoogle’s Pixel & Apple’s iPhone Track & Transmit Telemetry Data, Despite The...

Google’s Pixel & Apple’s iPhone Track & Transmit Telemetry Data, Despite The User Explicitly Opting Out – New Report

Published on

Malware protection

The data and the information of the users obtained by both Google on Android smartphones and Apple on iPhones have been in question for a long time. 

Recently, a study which is conducted by Douglas Leith of Trinity College has revealed that Google and Apple transmit telemetry data, notwithstanding the user explicitly opts out.

That’s why there are many users who literally try to limit this data to the maximum and watch for ways to prevent smartphones from monitoring and being able to learn more about us.

- Advertisement - SIEM as a Service

The amount of data that both the companies collect from users with different methods has been taken into account, and it passes from the phone to the databases of both companies without us being able to do practically anything to prevent it. 

In the maximum number of cases, they are not relevant data, but still, we are already part of a large amount of data globally.

Google collects 20 times more data than Apple

The study by Douglas Leith shows that how Google is capable of receiving data from smartphones even without having logged in with a Google account. While Apple also has access to the users’ data but, when it boasts privacy, they do so for some reason when compared to Android smartphones.

In both cases, iPhone and Android phones collect data from apps and the system itself; here, the most interesting thing is that both of them has the ability to obtain the when the smartphone is completely inactive. 

In short, our smartphones are constantly being monitored, even if it does not have access to a Wi-Fi or mobile data connection.

Amount of data Google and Apple collect

While in the case of Google, it collects up to 1MB of data from Chrome, YouTube, Google Docs, the clock or even the message app as well. And in the case of Apple, it gets around 42KB to 52KB of the data from Siri, Safari, iCloud, and it’s a really notable difference as compare to Google.

When the smartphones remain at idle state or inactive, Google’s Android continue to collect up to 1 MB of user data in every 12 hours. At the same time, Apple collects about 42 KB to 52 KB of data in every 12 hours. 

So, if we compare this data with the volume of users present in a country like the United States, then we will find more than 1 TB of data in every 12 hours from Google and in the case of Apple, only 5 GB of data.

Google acts against this report

Google informed after this investigation was revealed that the data that is obtained by them is essential to keep their software (Android OS) updated and verify that everything works precisely. 

Even Google also asserted that methodologically it’s not ethical and appropriate. Still, Google once again insisted that the data obtained by them is essential to keep the Android OS updated and work properly.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot...

Finding The Right E-Commerce Platform – Comparing Reselling Solutions

If you’re looking to make some extra cash or to start a business, you...

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

Chrome 131 Released with the Fix for Multiple Vulnerabilities

The Chrome team has officially announced the release of Chrome 131 for Windows, Mac,...