The Dark Side of Mobile Apps: Risks and Threats You Need to Know and How to Detoxify

 

Mobile applications (apps) have become an indispensable part of our daily lives. From checking the latest news on social media to ordering lunch and seeking entertainment, mobile apps are ubiquitous, especially among Gen Z. They have not only transformed our social lives but also revolutionized various industries, including e-commerce, health, and education. However, as we embrace these apps, it's essential to acknowledge the hidden risks and threats they pose. In this blog, we'll explore the dark side of mobile apps, focusing on the creepy permissions and trackers that invade our privacy. Moreover, we'll provide practical tips on how to detoxify your mobile phone and protect your digital life.

Mobile apps have come a long way since their inception. The journey began in the 1980s with the Psion Organiser I model, considered the "World's First Practical Pocket Computer." This early device featured apps like a calculator and clock. A decade later, IBM introduced the world's first smartphone in 1993, equipped with apps similar to those on the Psion. The BlackBerry Smartphone, launched in 2002, marked another milestone by introducing email capabilities.

However, the mobile app landscape changed dramatically in 2010 when Apple unveiled its revolutionary app store. In Quarter 3 of 2021, there were nearly 34 billion app downloads, and in 2020 alone, 86.7 billion apps were downloaded worldwide. Google Play accounted for 108.5 billion downloads, while iOS saw 34.4 billion downloads. These numbers highlight the overwhelming presence and impact of mobile apps in our lives.

Despite the convenience and utility of mobile apps, they often demand permissions that seem unnecessary. A study by Unwanted Witness revealed that apps like the King James android app requested 33 different permissions, while Xender, a file-sharing app, asked for a staggering 158 permissions along with 8 trackers. What's more concerning is that even after you install updates, these apps continue to request additional permissions.

Trackers, in particular, pose a significant threat to our privacy. These software components are designed to collect specific information about our devices and digital profiles, which is then shared with third-party companies. Trackers enable smartphones to monitor our behavior and activities, resulting in the creation of highly detailed digital profiles that contain intimate information about our lives. Ever experienced an advertisement related to a recent conversation? This is the result of the data trackers and permissions, traded between companies without our consent. For instance, during a study that was carried out between 2019 and 2020 Privacy International found that menstruation apps were sharing sensitive health data with companies like Facebook without users' knowledge.

In addition to the more visible privacy concerns related to permissions and trackers, there are also covert and side-channel threats that lurk within mobile apps;

A covert channel enables communication between two apps, allowing one app to share permissions or data with another app that lacks those permissions. This collusion between apps can lead to privacy breaches or unauthorized data sharing. It's a method that exploits the cooperation between apps to achieve actions that individual apps might not be able to perform on their own.

A side channel refers to a situation where an app can access protected data and system resources without explicit permission. Picture this: you have a fitness app that tracks your daily steps. It's supposed to help you stay healthy, but it has a little problem. Whenever you take a step, it makes your phone use a tiny bit more battery power. So, someone could look at how much battery your phone uses and figure out when you're walking or not.

To protect your digital privacy and detoxify your mobile phone, follow these practical steps:

Review Privacy Policies: Before installing a mobile app, take the time to read its privacy policy. Understand what data the app collects and how it uses that information.

Check Permissions and Trackers: Examine the permissions an app requests during installation.

·       On Android, go to Menu > Settings > Applications > Manage applications, or Menu > Settings > Apps, and tap on the app to review permissions.

·       On iOS, navigate to Settings > Privacy & Security and tap on App Privacy Report.

Periodic Permission Audits: Regularly review the permissions granted to apps already installed on your phone. Revoke unnecessary permissions to limit the data they can access.

Uninstall Unused Apps: Take a closer look at the apps on your phone. If you haven't used an app in a while, consider uninstalling it. Accessing services through a web browser can often be a more secure alternative.

Mobile apps have undoubtedly enhanced our lives in numerous ways, but it's crucial to be aware of the risks they pose to our privacy. Creepy permissions and trackers can compromise our digital security and personal data. By staying informed about app permissions, regularly auditing your device, and uninstalling unused apps, you can take control of your digital life and enjoy the benefits of mobile apps without falling victim to their dark side. Remember, your #PrivacyMatters.  

Christopher Kalema works in the Data Protection Affairs department at PDPO.

Comments

Popular posts from this blog

The State of Data Protection in Uganda: PDPO

PDPO Unveils the 2024 Data Privacy Campaign

PDPO wraps up investigation into data security breach at USE