The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services

N. Samarin, Alex Sanchez, Trinity Chung, Akshay Dan Bhavish Juleemun, Conor Gilsenan, Nick Merrill, Joel Reardon, Serge Egelman
{"title":"The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services","authors":"N. Samarin, Alex Sanchez, Trinity Chung, Akshay Dan Bhavish Juleemun, Conor Gilsenan, Nick Merrill, Joel Reardon, Serge Egelman","doi":"10.56553/popets-2024-0151","DOIUrl":null,"url":null,"abstract":"Like most modern software, secure messaging apps rely on thirdparty components to implement important app functionality. Although this practice reduces engineering costs, it also introduces the risk of inadvertent privacy breaches due to misconfiguration errors or incomplete documentation. Our research investigated secure messaging apps' usage of Google's Firebase Cloud Messaging (FCM) service to send push notifications to Android devices. We analyzed 21 popular secure messaging apps from the Google Play Store to determine what personal information these apps leak in the payload of push notifications sent via FCM. Of these apps, 11 leaked metadata, including user identifiers (10 apps), sender or recipient names (7 apps), and phone numbers (2 apps), while 4 apps leaked the actual message content. Furthermore, none of the data we observed being leaked to FCM was specifically disclosed in those apps' privacy disclosures. We also found several apps employing strategies to mitigate this privacy leakage to FCM, with varying levels of success. Of the strategies we identified, none appeared to be common, shared, or well-supported. We argue that this is fundamentally an economics problem: incentives need to be correctly aligned to motivate platforms and SDK providers to make their systems secure and private by default.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"51 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings on Privacy Enhancing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56553/popets-2024-0151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Like most modern software, secure messaging apps rely on thirdparty components to implement important app functionality. Although this practice reduces engineering costs, it also introduces the risk of inadvertent privacy breaches due to misconfiguration errors or incomplete documentation. Our research investigated secure messaging apps' usage of Google's Firebase Cloud Messaging (FCM) service to send push notifications to Android devices. We analyzed 21 popular secure messaging apps from the Google Play Store to determine what personal information these apps leak in the payload of push notifications sent via FCM. Of these apps, 11 leaked metadata, including user identifiers (10 apps), sender or recipient names (7 apps), and phone numbers (2 apps), while 4 apps leaked the actual message content. Furthermore, none of the data we observed being leaked to FCM was specifically disclosed in those apps' privacy disclosures. We also found several apps employing strategies to mitigate this privacy leakage to FCM, with varying levels of success. Of the strategies we identified, none appeared to be common, shared, or well-supported. We argue that this is fundamentally an economics problem: incentives need to be correctly aligned to motivate platforms and SDK providers to make their systems secure and private by default.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
媒介即信息:安全信息应用程序如何向推送通知服务泄露敏感数据
与大多数现代软件一样,安全信息应用程序依赖第三方组件来实现重要的应用程序功能。虽然这种做法降低了工程成本,但也带来了因配置错误或文档不完整而无意中泄露隐私的风险。我们的研究调查了安全消息应用程序使用谷歌的 Firebase 云消息(FCM)服务向安卓设备发送推送通知的情况。我们分析了 Google Play 商店中 21 款流行的安全信息应用程序,以确定这些应用程序在通过 FCM 发送的推送通知的有效载荷中泄露了哪些个人信息。在这些应用程序中,有 11 款泄露了元数据,包括用户标识符(10 款应用程序)、发件人或收件人姓名(7 款应用程序)和电话号码(2 款应用程序),而有 4 款应用程序泄露了实际信息内容。此外,我们观察到泄露给 FCM 的数据都没有在这些应用程序的隐私披露中明确披露。我们还发现,有几款应用程序采用了一些策略来减少向 FCM 泄露隐私的情况,但取得了不同程度的成功。在我们发现的这些策略中,没有一种似乎是通用的、共享的或得到广泛支持的。我们认为,这从根本上说是一个经济学问题:需要正确地调整激励机制,以激励平台和 SDK 提供商在默认情况下确保其系统的安全性和私密性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services Automatic Generation of Web Censorship Probe Lists FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds Generational Differences in Understandings of Privacy Terminology Anonify: Decentralized Dual-level Anonymity for Medical Data Donation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1