Apples’ Shazam for iOS Sheds 3rd Party SDKs. Keeps pumping your data through on Android.

Shazam, the song identification app Apple bought for $400M, recently released an update to its iOS app that got rid of all 3rd party SDKs the app was using except for one.

The SDKs that were removed include ad networks, analytics trackers, and even open-source utilities. Why, you ask? Because all of those SDKs leak usage data to 3rd parties one way or another, something Apple really really dislikes.

Here are all the SDKs that were uninstalled in the latest update:

AdMob
Bolts
DoubleClick
FB Ads
FB Analytics
FB Login
InMobi
IAS
Moat
MoPub

Right now, the app only has one 3rd party SDK installed and that’s HockeyApp. Microsoft’s version of TestFlight. It’s unclear why it’s still there, but we don’t expect it to stick around for too long.

Looking across Apple’s entire app portfolio it’s very uncommon to see 3rd party SDKs at all. Exceptions exist. One such example is Apple’s Support app which has the Adobe Analytics SDK installed.

Things Are Different on Android

Since Shazam is also available for Android we expected to see the same behavior. A mass uninstall of 3rd party SDKs. At first glance it seems to be the case, but not exactly.

Here are all the SDKs that were uninstalled in the last update:

AdColony
AdMob
Amazon Ads
Ads
FB Analytics
Gimbal
Google IMA
MoPub

Here are all the SDKs that are still installed in Shazam for Android:

Bolts
FB Analytics
Butter Knife
Crashlytics
Fabric
Firebase
Google Maps
OKHttp
Otto

On Android, Apple seems to be ok with leaking usage data to both Facebook through the Facebook Login SDK and Google through Fabric and Google Maps, indicating Apple hasn’t built out its internal set of tools for Android.

It’s also worth noting that HockeyApp was removed from Shazam from Android more than a year ago.

Want to see which SDKs apps have installed? Check out Explorer, the most comprehensive SDK Intelligence platform for iOS and Android apps.

Source: Shazam for iOS Sheds 3rd Party SDKs | App store Insights from Appfigures

Facebook receives personal health data from apps, even if you don’t have a FB account

Facebook receives highly personal information from apps that track your health and help you find a new home, testing by The Wall Street Journal found. Facebook can receive this data from certain apps even if the user does not have a Facebook account, according to the Journal.

Facebook has already been in hot water concerning issues of consent and user data.

Most recently, a TechCrunch report revealed in January that Facebook paid users as young as teenagers to install an app that would allow the company to collect all phone and web activity. Following the report, Apple revoked some developer privileges from Facebook, saying Facebook violated its terms by distributing the app through a program meant only for employees to test apps prior to release.

The new report said Facebook is able to receive data from a variety of apps. Of more than 70 popular apps tested by the Journal, they found at least 11 apps that sent potentially sensitive information to Facebook.

The apps included the period-tracking app Flo Period & Ovulation Tracker, which reportedly shared with Facebook when users were having their periods or when they indicated they were trying to get pregnant. Real estate app Realtor reportedly sent Facebook the listing information viewed by users, and the top heart-rate app on Apple’s iOS, Instant Heart Rate: HR Monitor, sent users’ heart rates to the company, the Journal’s testing found.

The apps reportedly send the data using Facebook’s software-development kit, or SDK, which help developers integrate certain features into their apps. Facebook’s SDK includes an analytics service that helps app developers understand its users’ trends. The Journal said developers who sent sensitive information to Facebook used “custom app events” to send data like ovulation times and homes that users had marked as favorites on some apps.

A Facebook spokesperson told CNBC, “Sharing information across apps on your iPhone or Android device is how mobile advertising works and is industry standard practice. The issue is how apps use information for online advertising. We require app developers to be clear with their users about the information they are sharing with us, and we prohibit app developers from sending us sensitive data. We also take steps to detect and remove data that should not be shared with us.”

Source: Facebook receives personal health data from apps: WSJ

W3C approves WebAuthn as the web standard for password-free logins using FIDO2

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in November 2015, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, IBM, Intel, Microsoft, Mozilla, PayPal, SoftBank, Tencent, and Yubico.

The specification lets users log into online accounts using biometrics, mobile devices, and/or FIDO security keys. WebAuthn is supported by Android and Windows 10. On the browser side, Google Chrome, Mozilla Firefox, and Microsoft Edge all added support last year. Apple has supported WebAuthn in preview versions of Safari since December.

Killing the password

“Now is the time for web services and businesses to adopt WebAuthn to move beyond vulnerable passwords and help web users improve the security of their online experiences,” W3C CEO Jeff Jaffe said in a statement. “W3C’s Recommendation establishes web-wide interoperability guidance, setting consistent expectations for web users and the sites they visit. W3C is working to implement this best practice on its own site.”

Although the W3C hasn’t adopted its own creation yet, WebAuthn is already implemented on sites such as Dropbox, Facebook, GitHub, Salesforce, Stripe, and Twitter. Now that WebAuthn is an official standard, the hope is that other sites will jump on board as well, leading to more password-free logins across the web.

But it’s not just the web. The FIDO Alliance wants to kill the password everywhere, a goal it has been working on for years and will likely still be working on for years to come.

FIDO2

W3C’s WebAuthn recommendation is a core component of the FIDO Alliance’s FIDO2 set of specifications. FIDO2 is a standard that supports public key cryptography and multifactor authentication — specifically, the Universal Authentication Framework (UAF) and Universal Second Factor (U2F) protocols. To help spur adoption, the FIDO Alliance provides testing tools and a certification program.

FIDO2 attempts to address traditional authentication issues in four ways:

  • Security: FIDO2 cryptographic login credentials are unique across every website; biometrics or other secrets like passwords never leave the user’s device and are never stored on a server. This security model eliminates the risks of phishing, all forms of password theft, and replay attacks.
  • Convenience: Users log in with simple methods such as fingerprint readers, cameras, FIDO security keys, or their personal mobile device.
  • Privacy: Because FIDO keys are unique for each internet site, they cannot be used to track users across sites.
  • Scalability: Websites can enable FIDO2 via an API call across all supported browsers and platforms on billions of devices consumers use every day.

“The Web Authentication component of FIDO2 is now an official web standard from W3C, an important achievement that represents many years of industry collaboration to develop a practical solution for phishing-resistant authentication on the web,” FIDO Alliance executive director Brett McDowell said in a statement. “With this milestone, we’re moving into the next phase of our shared mission to deliver simpler, stronger authentication to everyone using the internet today, and for years to come.”

Source: W3C approves WebAuthn as the web standard for password-free logins

Missing Out On Deep Sleep Causes Alzheimer’s Plaques to Build Up

Getting enough deep sleep might be the key to preventing dementia. In a series of recent experiments on mice, researchers discovered that deep sleep helps the brain clear out potentially toxic waste. The discovery reinforces how critical quality sleep is for brain health and suggests sleep therapies might curb the advance of memory-robbing ailments, like Alzheimer’s disease.

Alzheimer’s disease is a major problem for the patients, their families and society,” said Maiken Nedergaard, a neurologist at the University of Rochester Medical Center in New York, who led the new research. “Understanding how sleep can improve clearance of amyloid could have major impact on treatment.”

Clearing The Clutter

Cerebrospinal fluid churns through a system of brain tunnels piped in the spaces between brain cells and blood vessels. Scientists call it the glymphatic system. This system circulates nutrients like glucose, the brain’s primary energy source, and washes away potentially toxic waste.

And it may be the reason why animals even need sleep. The system takes out the brain’s trash when we’re asleep, and it shuts down when we’re awake. Nedergaard and her team were curious if the system works best and clears more waste — like Alzheimer’s causing beta amyloid plaque — when animals are in deep sleep.

To find out, the researchers used six different anesthetics to put mice into deep sleep. Then they tracked cerebrospinal fluid as it flowed into the brain. As the mice slept, the researchers watched the rodents’ brain activity on an electroencephalograph, or EEG, and recorded the animals’ blood pressures and heart and respiratory rates.

Rest And Restore

Mice anesthetized with a combination of two drugs, ketamine and xylazine, showed the strongest deep sleep brain waves and these brain waves predicted CSF flow into the brain, the researchers found. Their findings imply that the glymphatic system is indeed more active during the deepest sleep.

When the researchers analyzed the mice’s vital signs, they were surprised to find the animals anesthetized with the deep sleep drug combo of ketamine and xylazine also had the lowest heart rates, Nedergaard and her team report Wednesday in the journal Science Advances. The discovery means “low heart rate, which is a characteristic of athletes, is also a potent enhancer of glymphatic flow,” Nedergaard said. The results may explain why exercise buffers against poor memory.

The findings also have implications for people undergoing surgery. General anesthesia as well as long-term sedation in the intensive care unit is associated with delirium and difficulty with memory, especially in the elderly.

But most importantly, the research shows quality sleep is vital for brain health. “Focusing on sleep in the early stages of dementia might be able to slow progression of the disease,” Nedergaard said.

Source: Missing Out On Deep Sleep Causes Alzheimer’s Plaques to Build Up – D-brief

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State

Earlier this month, security researcher Victor Gevers found and disclosed an exposed database live-tracking the locations of about 2.6 million residents of Xinjiang, China, offering a window into what a digital surveillance state looks like in the 21st century.

Xinjiang is China’s largest province, and home to China’s Uighurs, a Turkic minority group. Here, the Chinese government has implemented a testbed police state where an estimated 1 million individuals from these minority groups have been arbitrarily detained. Among the detainees are academics, writers, engineers, and relatives of Uighurs in exile. Many Uighurs abroad worry for their missing family members, who they haven’t heard from for several months and, in some cases, over a year.

Although relatively little news gets out of Xinjiang to the rest of the world, we’ve known for over a year that China has been testing facial-recognition tracking and alert systems across Xinjiang and mandating the collection of biometric data—including DNA samples, voice samples, fingerprints, and iris scans—from all residents between the ages of 12 and 65. Reports from the province in 2016 indicated that Xinjiang residents can be questioned over the use of mobile and Internet tools; just having WhatsApp or Skype installed on your phone is classified as “subversive behavior.” Since 2017, the authorities have instructed all Xinjiang mobile phone users to install a spyware app in order to “prevent [them] from accessing terrorist information.”

The prevailing evidence of mass detention centers and newly-erected surveillance systems shows that China has been pouring billions of dollars into physical and digital means of pervasive surveillance in Xinjiang and other regions. But it’s often unclear to what extent these projects operate as real, functional high-tech surveillance, and how much they are primarily intended as a sort of “security theater”: a public display of oppression and control to intimidate and silence dissent.

Now, this security leak shows just how extensively China is tracking its Xinjiang residents: how parts of that system work, and what parts don’t. It demonstrates that the surveillance is real, even as it raises questions about the competence of its operators.

A Brief Window into China’s Digital Police State

Earlier this month, Gevers discovered an insecure MongoDB database filled with records tracking the location and personal information of 2.6 million people located in the Xinjiang Uyghur Autonomous Region. The records include individuals’ national ID number, ethnicity, nationality, phone number, date of birth, home address, employer, and photos.

Over a period of 24 hours, 6.7 million individual GPS coordinates were streamed to and collected by the database, linking individuals to various public camera streams and identification checkpoints associated with location tags such as “hotel,” “mosque,” and “police station.” The GPS coordinates were all located within Xinjiang.

This database is owned by the company SenseNets, a private AI company advertising facial recognition and crowd analysis technologies.

A couple of days later, Gevers reported a second open database tracking the movement of millions of cars and pedestrians. Violations like jaywalking, speeding, and going through a red-light are detected, trigger the camera to take a photo, and ping a WeChat API, presumably to try and tie the event to an identity.

Database Exposed to Anyone with an Internet Connection for Half a Year

China may have a working surveillance program in Xinjiang, but it’s a shockingly insecure security state. Anyone with an Internet connection had access to this massive honeypot of information.

Gevers also found evidence that these servers were previously accessed by other known global entities such as a Bitcoin ransomware actor, who had left behind entries in the database. To top it off, this server was also vulnerable to several known exploits.

In addition to this particular surveillance database, a Chinese cybersecurity firm revealed that at least 468 MongoDB servers had been exposed to the public Internet after Gevers and other security researchers started reporting them. Among these instances: databases containing detailed information about remote access consoles owned by China General Nuclear Power Group, and GPS coordinates of bike rentals.

A Model Surveillance State for China

China, like many other state actors, may simply be willing to tolerate sloppy engineering if its private contractors can reasonably claim to be delivering the goods. Last year, the government spent an extra $3 billion on security-related construction in Xinjiang, and the New York Times reported that China’s police planned to spend an additional $30 billion on surveillance in the future. Even poorly-executed surveillance is massively expensive, and Beijing is no doubt telling the people of Xinjiang that these investments are being made in the name of their own security. But the truth, revealed only through security failures and careful security research, tells a different story: China’s leaders seem to care little for the privacy, or the freedom, of millions of its citizens.

Source: Massive Database Leak Gives Us a Window into China’s Digital Surveillance State | Electronic Frontier Foundation

Scientists turn CO2 ‘back into coal’ in breakthrough carbon capture experiment

The research team led by RMIT University in Melbourne, Australia, developed a new technique using a liquid metal electrolysis method which efficiently converts CO2 from a gas into solid particles of carbon.

Published in the journal Nature Communications, the authors say their technology offers an alternative pathway for “safely and permanently” removing CO2 from the atmosphere.

Current carbon capture techniques involve turning the gas into a liquid and injecting it underground, but its use is not widespread due to issues around economic viability, and environmental concerns about leaks from the storage site.

The new technique results in solid flakes of carbon, similar to coal, which may be easier to store safely.

To convert CO2, the researchers designed a liquid metal catalyst with specific surface properties that made it extremely efficient at conducting electricity while chemically activating the surface.

The carbon dioxide is dissolved in a beaker filled with an electrolyte liquid along with a small amount of the liquid metal, which is then charged with an electrical current.

The CO2 slowly converts into solid flakes, which are naturally detached from the liquid metal surface, allowing for continuous production.

RMIT researcher Dr Torben Daeneke said: “While we can’t literally turn back time, turning carbon dioxide back into coal and burying it back in the ground is a bit like rewinding the emissions clock.”

“To date, CO2 has only been converted into a solid at extremely high temperatures, making it industrially unviable.

“By using liquid metals as a catalyst, we’ve shown it’s possible to turn the gas back into carbon at room temperature, in a process that’s efficient and scalable.

“While more research needs to be done, it’s a crucial first step to delivering solid storage of carbon.”

Lead author, Dr Dorna Esrafilzadeh said the carbon produced by the technique could also be used as an electrode.

“A side benefit of the process is that the carbon can hold electrical charge, becoming a supercapacitor, so it could potentially be used as a component in future vehicles,” she said.

“The process also produces synthetic fuel as a by-product, which could also have industrial applications.”

Source: Scientists turn CO2 ‘back into coal’ in breakthrough carbon capture experiment | The Independent