Superfish is also available for iOS and Android devices

In the last week, everyone involved in the have heard the news that wants Lenovo to have installed the adware along with a security certificate at her.
Meanwhile, Microsoft, Lenovo and other companies have released software to remove Superfish and the security certificate, but the problem seems to be on mobile devices as well.
Superfish

The equivalent of Superfish for mobile devices is called LikeThat and is available for iOS and Android devices in the special app stores of each platform.

The application is designed to "facilitate" them της σε αγορές με τη λήψη φωτογραφιών. Η φωτογραφία στη συνέχεια ανεβαίνει σε διακομιστές του Superfish και τη συγκρίνει για να ανακαλύψει οπτικά παρόμοια αποτελέσματα παρέχονται από χιλιάδες άλλους λιανοπωλητές.

Jonathan Zdziarski, a dedicated iOS researcher, checking the application's code found that it included some features that give each device a unique identity, and retain all the EXIF ​​data available in the photos.

The device ID is also sent to an analytics company assigned to the device without any notice to the user while sending the mobile MAC address.

As for the EXIF ​​data in the images, each user's private life is trapped if the GPS is enabled. So, among other things, companies have their exact location and the time that photography was taken. Imagine many photos from different locations can very well show the movements of a user in a specific time period.

The researcher found that the LikeThat Superfish for iOS is quite invasive and includes code that can leak device-related information such as free disk space, MAC address, memory used, CPU frequency, or type screen.

In a Friday's publication, the investigator points out that if some of the tracking capabilities are disabled (closed GPS) in versions of the application for iOS ή Android, the ability to collect and transmit the user's location is possible through the SFLocationAPI they use.

"It seems that Superfish, if it doesn't have the way to collect information from an image you select from your photo album (UIImagePicker), uses a technique that could allow access to underlying image metadata that most users don't know is stored," says the researcher.

You can see it all analysis of the researcher from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).