Esther Profile picture
Mar 22 • 13 tweets • 8 min read
🧵With the growing concerns about #TikTok, I finally decided to have a look to it. In this thread, I will cover a review of its privacy policy and a dynamic analysis of the Android app with @PiRogueTools and explain its limitations. Image
First of all, TikTok's privacy policy is quite explicit regarding what data is collected. Obviously, it collects the information the user provides such as profile information, contacts, payment card information or other third-party payment information. Image
Next, it collects a wide range of information such as keystroke patterns or rhythms, IP address, approx. location based on SIM card, IP or GPS location. It also detects and collects characteristics and features about the media by identifying objects and scenery. Image
The platform also infers information such as gender or interests and certainly more based on what we watch, what we like, the location where the app is used, etc. The purpose here is to build a profile in order to “suggest" relevant content. Image
Next, #TikTok gathers information from partners without explicitly telling who they are. It gets from partners information such as mobile identifiers, email address (plain or hashed), user ID and actions taken outside of the Platform. Image
#TikTok not only gathers information from partners, it shares some too without listing them. The platform shares unlisted information with advertisers to provide targeted ads and share technical and usage information with data partners, analytics services. Image
The business model of #TikTok, #Facebook and others is based on the attention economy. The longer you stay, the more ads you see, the more money we make. This MB relies on targeted ads, thus, the platform has to collect a pile of info to build a profile as accurate as possible. ImageImage
Now, jump in the dynamic analysis of the Android app. As you may know, #TikTok app is heavily obfuscated and collected data is encrypted before transmission. The encryption is done in a part of the app that I was not able to instrument. So, let's grab the low-hanging fruits. Image
By running the app on a rooted device and using PTS's #PiRogue, it is easy to retrieve TLS encryption keys, AES/RSA operations, socket activity and stack traces. We are then able to decrypt TLS traffic and decrypt encrypted payloads, except for traffic directly related to #TikTok Image
After a quick look at the captured network traffic, it appears that the app embeds 3rd-party SDKs such as AppsFlyer or Google Firebase as detected by @ExodusPrivacy. Note that AppsFlyer's SDK encrypts the data before transmitting it over TLS. It has probably something to hide. ImageImage
AppsFlyer collects information related to the device such as sensors, brand, fingerprint, advertising ID, carrier, boot time, etc. We find also app usage data such as first launch, time between launches... This data collection is done without any consent or any other legal basis. ImageImage
#TikTok collects a lot of info about the user, user's content, activity, device… Embedded SDKs collect data too, as usual. If some data processing is legitimate, other such as analytics, targeted ads cannot be based on legitimate interest.
The user's consent is required BEFORE the data collection takes place. The Privacy Policy is not a contract and cannot be considered as such. The sole purpose of this document is to inform the user of the various processing of their data.
That's all!

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Esther

Esther Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @U039b

Jan 16, 2022
Je me suis penchée sur l'application #elize dont tout le monde parle. Elle n'est pas sans controverse. Et sa sécurité est lacunaire au possible. Pour ce point je vous renvoie au thread de @MathisHammel.
➡️

Pour l'analyse des données, c'est par ici ⬇️
Afin d'analyser les flux de données, l'application est lancée dans un AVD, un petit morceau de Frida et Wireshark pour intercepter tout ce qui passe.
L'appli envoie des données à 2 serveurs :
- AWS d'Amazon, base de données de l'appli
- Facebook, pour une raison obscure
Commençons par les données envoyées à Facebook, on y trouve :
- un identifiant unique
- le nom de l'opérateur téléphonique
- diverses informations relatives au mobile
- le nom de l'application lancée

Aucun consentement n'a été donné concernant cette collecte. #RGPD, tout ça ...
Read 6 tweets
Aug 2, 2020
Aujourd'hui on parle beaucoup (trop) de la consommation d'Ă©nergie d'Internet alors voici un petit thread.

⬇️​⬇️​⬇️​

En 2010 dans le cadre de mes travaux de recherche, j'étudiais le problème de réduction de la consommation d'énergie des réseaux backbone via la théorie et

1/n
l'expérimentation. Dit autrement, l'objectif était de trouver de nouveaux algorithmes de routage plus économes en énergie tout en garantissant la capacité et la résilience du réseau.

Du point de vue matériel, le plus simple était de dessouder les LED des panneaux

2/n
frontaux permettant de gagner quelques 50mW par loupiotte. Et ça semble totalement débile :D J'avais bien-sûr exploré l'idée d'éteindre directement une à une les cartes réseaux mais à l'époque, en couper une n'était pas possible car groupées par 4 et

3/n
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(