TikTok used Android loophole to collect MAC addresses without user consent
#1
Information 
Quote:TikTok has come under scrutiny in recent weeks due to security issues for its allegedly close ties with the Chinese government and for stealing user data and passing it on to China. However, there was no concrete proof of any wrongdoing on TikTok's part so far. A Wall Street Journal analysis has discovered that TikTok violated Google Play's guidelines in the past and collected the MAC addresses of Android devices to track users online.
 
The company used an exploit in Android OS to collect and track the MAC addresses of Android devices. The MAC address is a 12-digit "address" of a mobile device that connects to the internet. MAC addresses are useful for advertisers since they are permanent which allows them to track a device across the internet and build a consumer behavior profile based on that. TikTok collected this data for at least 15 months until an update released on November 18 last year. The app used to automatically send the MAC address along with the device identifier to ByteDance servers when it was first launched on an Android device.
 
Google Play Store policies forbid apps from collecting "persistent device identifiers" like MAC addresses without explicit user consent. The policy has been into effect since at least 2015. The analysis by WSJ shows that apart from MAC addresses, TikTok was not collecting any unusual amount of user information, and whatever data was collected, they were all disclosed in its privacy policy.
 
However, the company went to great lengths to hide the collected data by wrapping them in an additional layer of custom encryption. This "obfuscation of this data makes it harder to determine what it’s doing" as per Nathan Good, a researcher at the International Digital Accountability Council. Marc Rogers, VP of cybersecurity strategy at Okta. Inc, believes that TikTok could be doing this to "bypass detection by Apple or Google because if Apple or Google saw them passing those identifiers back they would almost certainly reject the app."
 
A TikTok spokesperson said that the "current version of TikTok does not collect MAC addresses." WSJ also reached out to Google for a comment which said that is investigating the matter.

Source: Wall Street Journal

Source: https://www.neowin.net/news/tiktok-used-...er-consent
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Messages In This Thread
TikTok used Android loophole to collect MAC addresses without user consent - by silversurfer - 12 August 20, 14:44

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Vivaldi 7.9 Build 3970.47
Vivaldi 7.9 Build ...harlan4096 — 07:31
Microsoft Defender Antivirus security in...
Stable channel upd...harlan4096 — 07:25
Microsoft Defender Antivirus security in...
Stable channel upd...harlan4096 — 07:25
Google Chrome 146.0.7680.177/178
Google Chrome 146....harlan4096 — 07:22
F-Secure v26.3
Hello, as per the ...harlan4096 — 07:21

[-]
Birthdays
Today's Birthdays
avatar (44)lamSouse
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (47)creatralGuelm
avatar (38)procnipsut
avatar (44)accenwibly
avatar (41)ahyvily
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (48)cticigges
avatar (50)ecoFit
avatar (44)soccejeS
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)burntLaw
avatar (41)MrDoorsskibheeds
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (39)vemedProkbior
avatar (38)RobertUtelt
avatar (46)JamesZic
avatar (43)Sanfordbup
avatar (38)Der.Reisende
avatar (41)alapesihy
avatar (36)Kiran78

[-]
Online Staff
There are no staff members currently online.

>