Thursday, March 28, 2024

Google’s Pixel & Apple’s iPhone Track & Transmit Telemetry Data, Despite The User Explicitly Opting Out – New Report

The data and the information of the users obtained by both Google on Android smartphones and Apple on iPhones have been in question for a long time. 

Recently, a study which is conducted by Douglas Leith of Trinity College has revealed that Google and Apple transmit telemetry data, notwithstanding the user explicitly opts out.

That’s why there are many users who literally try to limit this data to the maximum and watch for ways to prevent smartphones from monitoring and being able to learn more about us.

The amount of data that both the companies collect from users with different methods has been taken into account, and it passes from the phone to the databases of both companies without us being able to do practically anything to prevent it. 

In the maximum number of cases, they are not relevant data, but still, we are already part of a large amount of data globally.

Google collects 20 times more data than Apple

The study by Douglas Leith shows that how Google is capable of receiving data from smartphones even without having logged in with a Google account. While Apple also has access to the users’ data but, when it boasts privacy, they do so for some reason when compared to Android smartphones.

In both cases, iPhone and Android phones collect data from apps and the system itself; here, the most interesting thing is that both of them has the ability to obtain the when the smartphone is completely inactive. 

In short, our smartphones are constantly being monitored, even if it does not have access to a Wi-Fi or mobile data connection.

Amount of data Google and Apple collect

While in the case of Google, it collects up to 1MB of data from Chrome, YouTube, Google Docs, the clock or even the message app as well. And in the case of Apple, it gets around 42KB to 52KB of the data from Siri, Safari, iCloud, and it’s a really notable difference as compare to Google.

When the smartphones remain at idle state or inactive, Google’s Android continue to collect up to 1 MB of user data in every 12 hours. At the same time, Apple collects about 42 KB to 52 KB of data in every 12 hours. 

So, if we compare this data with the volume of users present in a country like the United States, then we will find more than 1 TB of data in every 12 hours from Google and in the case of Apple, only 5 GB of data.

Google acts against this report

Google informed after this investigation was revealed that the data that is obtained by them is essential to keep their software (Android OS) updated and verify that everything works precisely. 

Even Google also asserted that methodologically it’s not ethical and appropriate. Still, Google once again insisted that the data obtained by them is essential to keep the Android OS updated and work properly.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles