cageymaru
Fully [H]
- Joined
- Apr 10, 2003
- Messages
- 21,969
A Delaware company called Big Star Labs created multiple spyware applications and 11 million people downloaded them from the Google Play store as Google Chrome extensions and the Apple App Store as an ad-blocker. The apps ranged from mobile health club apps to speed boost utilities. The apps collected data from every website that the user visited via their browser and sent the data back to several different servers. The terms of service said that they would send non-identifiable information, but analyzing the data stream proved otherwise. All of the apps have been removed from the app stores after the story broke, but the damage has already been done.
When you install or use the Poper Blocker Product, we collect from you: the type of device, operating system and browsers you are using; the date and time stamp; the browsing usage, including visited URLs, clickstream data or web address accessed; TabID; the browser identifier; and your Internet Protocol address (trimmed and hashed so that it cannot be used to identify you).
The last part of this clause is not quite true. I am not sure what they mean by this non-identifying "trimming and hashing", but I observed the full-page addresses being transmitted to their server.
When you install or use the Poper Blocker Product, we collect from you: the type of device, operating system and browsers you are using; the date and time stamp; the browsing usage, including visited URLs, clickstream data or web address accessed; TabID; the browser identifier; and your Internet Protocol address (trimmed and hashed so that it cannot be used to identify you).
The last part of this clause is not quite true. I am not sure what they mean by this non-identifying "trimming and hashing", but I observed the full-page addresses being transmitted to their server.