Sunday, April 22, 2012

Google takes pictures without permission





Applications for the mobile operating system Android from Google can handle pictures without your permission, experts have found. This is a legacy left by the previous model, data storage, are justified by the corporation, and promise to change the access settings. Google. violates safety standards, experts say.
Applications for the mobile operating system. Google's Android. can copy photos to a remote server without prior notice to users, experts have found out The New York Times.

... - This is based on the results of research devices company Lookout ».

Technical Director Ralf Loupe Guti showed corresponding experiment on one of the test applications. When you install a program requests access to the internet, and when the application starts, it has itself passed to the library with photos, found a recent picture and publish them on a public photo-sharing sites. ... I was really shocked, ...

The New York Times did not specify whether or not applications use this scheme in practice. Google Inc. acknowledged that such a possibility does exist, promising to consider changing the configuration of access. According to the Internet company,.

no restrictions on access to the photos related to the previous model, data storage devices, Android-. The first smartphone based on Google's OS could save the images on a removable memory card, making it difficult to access image.
For example, a user can give the application access for photos with a single card, but did not allow access to photos from the one that put the device on a different day. ... - Then the images were stored on the cards SD, they were easy to pull out your phone and insert into your computer to view and transfer images.

When computers and tablets are made ​​with built-in memory, which can not be removed, we again look at the situation and decided to add a resolution that would allow applications to request access to the images ...
Explanation of Google « surprise most people, because they are unlikely to know about such differences in a retrieval system, phone,... For them, such permission will Google ...

... Users can leave comments about the applications suspicious activity, and the company is considering such applications. Google also has its own security system Bouncer, who with the help of simulations of different situations, checks whether the application to receive, for example, users' personal data.

But the Android Market allows any developer to submit your application. This means that if a malicious program will bypass the system automatically checks Google, it might eventually appear on many devices.
... - However, this assumption is false ...

In mid-February, the U.S. Congress have expressed concern over the security of user information. Attracted the attention of lawmakers Post blogger Dustin Curtis, who noted that among the developers of applications for Apple's iOs there is a perception that they can not permit users to access their address books, and save for future reference. Thus, the application of the Path Inc. without the consent of users within 18 months of retained information from their address books, and Twitter on their servers got all the contacts from your address book when the user pressed the button in Twitter ... Then Apple has promised to finalize the operating system of its smartphone iPhone, to provide users with greater control access to your address book from the application.

It later emerged that a free application for smart phones, companies can track the users text messages, intercept calls, track the location, manage videos and photos.

Explanation of Google's access to the photos contradict the previously stated requirements for data processing Android, experts say.
Last week, a Google spokesman Randall Safar said the strict rules of Google in this regard: ... In the Security Guide for Android- developers: ... The rules stated that it concerns ...

ANASTASIA MATVEEVA.
Source:. www. gazeta. ru.

No comments:

Post a Comment