{"id":1498,"date":"2014-01-30T05:42:33","date_gmt":"2014-01-30T10:42:33","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1498"},"modified":"2014-01-30T05:42:33","modified_gmt":"2014-01-30T10:42:33","slug":"nsa-spying-on-apps-shows-perils-of-google-candy-crush","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/nsa-spying-on-apps-shows-perils-of-google-candy-crush.php","title":{"rendered":"NSA Spying on Apps Shows Perils of Google+, \u2018Candy Crush\u2019"},"content":{"rendered":"<p><p>    Revelations that the National Security Agency is tapping    smartphone applications to mine personal information highlight    the risk millions take every day when they play games, schedule    lunch or check the weather.  <\/p>\n<p>    Documents released by former NSA contractor Edward Snowden to    the New York Times, the Guardian and ProPublica show the    U.S. and U.K. have infiltrated mobile software for details    about users comings and goings and social affiliations. Among    the so-called leaky apps with the greatest privacy perils are    Google    Inc. (GOOG)s Google Plus, Pinterest Inc.s online bulletin    board and Candy Crush Saga, the most popular game on    Facebook Inc.    (FB), according to an analysis by Zscaler Inc.  <\/p>\n<p>    Privacy is dead in the digital world that we live in, said    Michael Sutton, vice president of security research at San    Jose, California-based Zscaler. I tell people, unless you    are comfortable putting that statement on a billboard in Times    Square and having everyone see it, I would not share that    information digitally.  <\/p>\n<p>    The latest disclosures from Snowden underscore how vast a    treasure trove mobile apps are, and not only for the    advertisers that sweep them for consumer data. Zscalers    analysis found that 96 percent of the top 25 social-networking    apps request e-mail access, 92 percent ask for access to users    address books and 84 percent inquire about their physical    locations. Sutton said most people give the apps what they    want.  <\/p>\n<p>    Applications for smartphones and tablets present a challenge    when it comes to security because, unlike with computer    software, most apps depend almost entirely on ads to make    money.  <\/p>\n<p>    While technology companies often encrypt what they collect to    shield it from prying eyes, the advertising services they work    with frequently dont, said Kevin Mahaffey, co-founder and    chief technology officer of Lookout Inc. in San Francisco.  <\/p>\n<p>    Lookout studied 30,000 apps a day this month and found that 38    percent of those for Android systems could determine locations,    that half could access the unique code assigned to a persons    device and that 15 percent could grab phone numbers.  <\/p>\n<p>    The reach of apps, and of the networks advertisers use to pass    data around, make them natural eavesdropping targets and are    aiding a shift in the focus of surveillance efforts away from    personal computers, Mahaffey said.  <\/p>\n<p>    They have a lot of valuable information and theyre    everywhere, he said. Everyone from the NSA to Microsoft to    Google see mobile as the future.  <\/p>\n<p>    Google, based in Mountain View, California, declined to comment and referred to a    statement from the Application Developers Alliance, a trade    group to which it belongs.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.bloomberg.com\/news\/2014-01-29\/nsa-spying-on-apps-shows-perils-of-google-candy-crush-.html\" title=\"NSA Spying on Apps Shows Perils of Google+, \u2018Candy Crush\u2019\">NSA Spying on Apps Shows Perils of Google+, \u2018Candy Crush\u2019<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Revelations that the National Security Agency is tapping smartphone applications to mine personal information highlight the risk millions take every day when they play games, schedule lunch or check the weather. Documents released by former NSA contractor Edward Snowden to the New York Times, the Guardian and ProPublica show the U.S. and U.K. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-1498","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1498"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1498"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1498\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}