Many An­droid VPNs don’t do their job, ac­cord­ing to se­cu­rity re­port

Your pri­vacy may not be as pri­vate as you think.

APC Australia - - Technotes - Stephen Lam­brechts

Ac­cord­ing to a new pa­per funded by the CSIRO’s Data61 re­search in­sti­tute and the US Na­tional Sci­ence Foun­da­tion, many of the An­droid VPN apps found on the Google Play store have been found to leave user data ex­posed. “Our re­sults show that — in spite of the prom­ises for pri­vacy, se­cu­rity and anonymity given by the ma­jor­ity of VPN apps — mil­lions of users may be un­awarely sub­ject to poor se­cu­rity guar­an­tees and abu­sive prac­tices in­flicted by VPN apps,” stated the re­searchers.

The study found that 82% of the apps re­quested per­mis­sion to ac­cess ac­counts data and pri­vate text mes­sages, 75% used third-party track­ing li­braries, 18% used tun­nel­ing pro­to­cols with­out en­cryp­tion and 84% left IPv6 traf­fic un­pro­tected due to lack of sup­port, mis­con­fig­u­ra­tions and de­vel­oper er­rors.

Worse still, of the 283 apps tested over­all, 38% were found to con­tain “some mal­ware pres­ence” when run through the free on­line virus scan­ner VirusTo­tal. These in­clude the pop­u­lar apps EasyOVPN, TigerVPN and VPN Free.

Newspapers in English

Newspapers from Australia

© PressReader. All rights reserved.