Categories: Cyber Security News

Google’s Pixel & Apple’s iPhone Track & Transmit Telemetry Data, Despite The User Explicitly Opting Out – New Report

The data and the information of the users obtained by both Google on Android smartphones and Apple on iPhones have been in question for a long time. 

Recently, a study which is conducted by Douglas Leith of Trinity College has revealed that Google and Apple transmit telemetry data, notwithstanding the user explicitly opts out.

That’s why there are many users who literally try to limit this data to the maximum and watch for ways to prevent smartphones from monitoring and being able to learn more about us.

The amount of data that both the companies collect from users with different methods has been taken into account, and it passes from the phone to the databases of both companies without us being able to do practically anything to prevent it. 

In the maximum number of cases, they are not relevant data, but still, we are already part of a large amount of data globally.

Google collects 20 times more data than Apple

The study by Douglas Leith shows that how Google is capable of receiving data from smartphones even without having logged in with a Google account. While Apple also has access to the users’ data but, when it boasts privacy, they do so for some reason when compared to Android smartphones.

In both cases, iPhone and Android phones collect data from apps and the system itself; here, the most interesting thing is that both of them has the ability to obtain the when the smartphone is completely inactive. 

In short, our smartphones are constantly being monitored, even if it does not have access to a Wi-Fi or mobile data connection.

Amount of data Google and Apple collect

While in the case of Google, it collects up to 1MB of data from Chrome, YouTube, Google Docs, the clock or even the message app as well. And in the case of Apple, it gets around 42KB to 52KB of the data from Siri, Safari, iCloud, and it’s a really notable difference as compare to Google.

When the smartphones remain at idle state or inactive, Google’s Android continue to collect up to 1 MB of user data in every 12 hours. At the same time, Apple collects about 42 KB to 52 KB of data in every 12 hours. 

So, if we compare this data with the volume of users present in a country like the United States, then we will find more than 1 TB of data in every 12 hours from Google and in the case of Apple, only 5 GB of data.

Google acts against this report

Google informed after this investigation was revealed that the data that is obtained by them is essential to keep their software (Android OS) updated and verify that everything works precisely. 

Even Google also asserted that methodologically it’s not ethical and appropriate. Still, Google once again insisted that the data obtained by them is essential to keep the Android OS updated and work properly.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

16 hours ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

17 hours ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

21 hours ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

1 day ago

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits…

1 day ago

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…

1 day ago