{"id":14469,"date":"2019-01-31T10:45:25","date_gmt":"2019-01-31T18:45:25","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/01\/31\/news-8221\/"},"modified":"2019-01-31T10:45:25","modified_gmt":"2019-01-31T18:45:25","slug":"news-8221","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/01\/31\/news-8221\/","title":{"rendered":"Why Facebook&#8217;s Banned &#8216;Research&#8217; App Was So Invasive"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c522412f254572cc21b8235\/master\/pass\/fbvpn-01%20(1).jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Thu, 31 Jan 2019 01:15:12 +0000<\/strong><\/p>\n<p><span class=\"lede\">For the past <\/span>three years, Facebook has paid consumers as young as 13 to download a \u201cFacebook Research\u201d application that gives the company wide-ranging access to their mobile devices, according to a <a href=\"https:\/\/techcrunch.com\/2019\/01\/29\/facebook-project-atlas\/\" target=\"_blank\">TechCrunch<\/a> investigation published Tuesday. In order to allow people with iPhones to participate, Facebook sidestepped the strict privacy rules imposed by Apple in its App Store by taking advantage of a business applications program designed for internal company use. Apple soon announced it was revoking Facebook\u2019s access to its <a href=\"https:\/\/developer.apple.com\/programs\/enterprise\/\" target=\"_blank\">Developer Enterprise Program<\/a>, which also allowed the company to share custom iOS apps with its own employees. Apple\u2019s decision is reportedly <a href=\"https:\/\/www.businessinsider.com\/facebook-employees-angry-after-apple-blocks-its-internal-ios-apps-2019-1\" target=\"_blank\">wreaking havoc<\/a> at the social network, rendering workers unable to access the apps they use for their jobs.<\/p>\n<p>As Facebook <a href=\"https:\/\/www.wired.com\/story\/facebook-research-app-lessons\/\">deals with the fallout<\/a> from yet another privacy scandal, it\u2019s worth unpacking how its Research app worked\u2014especially because it serves as a good reminder for other apps you might already be using, particularly <a href=\"https:\/\/www.wired.com\/2017\/03\/want-use-vpn-protect-privacy-start\/\">virtual private networks<\/a>.  It wasn\u2019t just Facebook: Google also <a href=\"https:\/\/techcrunch.com\/2019\/01\/30\/googles-also-peddling-a-data-collector-through-apples-back-door\/\" target=\"_blank\">disabled<\/a> a similar app on iOS devices on Wednesday. Both apps are still available on Android.<\/p>\n<p class=\"paywall\">Facebook reportedly paid users between the ages of 13 and 35 $20 a month to download the app through beta-testing companies like Applause, BetaBound, and uTest. Participants found out about the opportunity via Snapchat and Instagram advertisements, according to TechCrunch. Minors were required to get consent from their parents. Once approved, participants downloaded the app via their browser\u2014not through the Google Play Store or the Apple App Store.<\/p>\n<p class=\"paywall\">Apple typically <a href=\"https:\/\/www.wired.com\/story\/pepper-v-apple-supreme-court-app-store-antitrust\/\">doesn\u2019t allow<\/a> app developers to <a href=\"https:\/\/www.wired.com\/story\/apple-app-developers-union\/\">go around<\/a> the App Store, but its enterprise program is one exception. It\u2019s what allows companies to create custom apps not meant to be downloaded publicly, like an iPad app for signing guests into a corporate office. But Facebook used this program for a consumer research app, which Apple says violates its rules. \u201cFacebook has been using their membership to distribute a data-collecting app to consumers, which is a clear breach of their agreement with Apple,\u201d a spokesperson said in a statement. \u201cAny developer using their enterprise certificates to distribute apps to consumers will have their certificates revoked, which is what we did in this case to protect our users and their data.\u201d Facebook didn\u2019t respond to a request for comment.<\/p>\n<p class=\"paywall\">Facebook needed to bypass Apple\u2019s usual policies because its Research app is particularly invasive. First, it requires users to install what is known as a \u201c<a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/\" target=\"_blank\">root certificate<\/a>.\u201d This lets Facebook look at much of your browsing history and other network data, even if it\u2019s encrypted. The certificate is like a shape-shifting passport\u2014with it, Facebook can pretend to be almost anyone it wants. If you visit the website for a clothing retailer, for instance, Facebook can use the root certificate to pretend to be the store and see the pants you were looking to buy. \u201cYou allow Facebook to pretend to be anyone they want to be on the internet\u2014your device will trust the certificates they generate,\u201d says David Choffnes, a professor and mobile networking researcher at Northeastern University.<\/p>\n<p class=\"paywall\">Facebook couldn&#x27;t use its root certificate for every website or application, since some companies, like banks, protect hackers from using them for man-in-the-middle attacks using a technique called \u201c<a href=\"https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSHSCD_7.1.0\/com.ibm.worklight.dev.doc\/monitor\/c_cert_pinning_intro.html\" target=\"_blank\">certificate pinning<\/a>.\u201d The bank or other company essentially decides that it won\u2019t accept any certificate but its own\u2014it knows not to take phonies like Facebook\u2019s. \u201cThis attack doesn\u2019t work on everything, but there\u2019s still a large fraction of apps that are vulnerable because it\u2019s not a standard threat model,\u201d says Choffnes.<\/p>\n<p>&quot;You allow Facebook to pretend to be anyone they want to be on the internet\u2014your device will trust the certificates they generate.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">David Choffnes, Northeastern University<\/p>\n<p class=\"paywall\">Facebook\u2019s app also established an on-demand private network connection, meaning it routed all of the participants&#x27; traffic through its own servers before passing it along to its final destination. This is essentially what <a href=\"https:\/\/www.wired.co.uk\/article\/best-vpn-free-in-for-uk\" target=\"_blank\">all VPNs do<\/a>\u2014they disguise traffic by rerouting it, allowing you to hide things like your location, perhaps to use Gmail in China or access streaming shows not available where you live. But VPNs typically can\u2019t see your <a href=\"https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/\">encrypted traffic<\/a>, since they don\u2019t have the right certificate. They can still look at your unencrypted traffic, which can be an issue, but the vast majority of internet traffic today happens <a href=\"https:\/\/www.wired.com\/story\/hotel-airport-wifi-safe\/\">over encrypted HTTPS connections<\/a>. But with its root certificate installed, Facebook <em>could<\/em> decrypt the browsing history or other network traffic of the people who downloaded Research, possibly even their encrypted messages.<\/p>\n<p class=\"paywall\">To use a nondigital analogy, Facebook not only intercepted every letter participants sent and received, it also had the ability to open and read them. All for $20 a month!<\/p>\n<p class=\"paywall\">Using its VPN connection and root certificate, Facebook had the ability to gather extensive data from participants, including their browsing history, what apps they used and for how long, as well as the messages they sent. Facebook also requested some people screenshot their Amazon orders page, according to TechCrunch, suggesting the social network may have had an interest in consumer purchasing habits. But unless Facebook discloses what it sought to learn from Research, there\u2019s no way to know exactly what the app might have been collecting.<\/p>\n<p class=\"paywall\">\u201cCapability versus actual things they did is a much bigger question,\u201d says Mike Murray, the chief security officer of the mobile security firm Lookout. \u201cBecause that all happens on the backend, you can\u2019t really tell what they did.\u201d<\/p>\n<p class=\"paywall\">In the past, Facebook has used a similar app to learn more about its rivals. In 2013, the social network acquired Onavo, an Israeli VPN maker, which it reportedly used to <a href=\"https:\/\/www.wsj.com\/articles\/the-new-copycats-how-facebook-squashes-competition-from-startups-1502293444\" target=\"_blank\">research<\/a> popular emerging apps in order to either copy or buy them.  It used Onavo to look into <a href=\"https:\/\/www.buzzfeednews.com\/article\/charliewarzel\/why-facebook-bought-whatsapp\" target=\"_blank\">WhatsApp<\/a>, for instance, which Facebook later acquired in 2014. Last year, Facebook <a href=\"https:\/\/www.wired.com\/story\/facebook-onavo-protect-vpn-privacy\/\">began promoting<\/a> Onavo in its iOS app under the banner \u201cProtect,\u201d but it later pulled the app from the App Store after Apple said it violated its new data-sharing policies, according to <a href=\"https:\/\/www.wsj.com\/articles\/facebook-to-remove-data-security-app-from-apple-store-1534975340\" target=\"_blank\"><em>The Wall Street Journal<\/em><\/a>.<\/p>\n<p class=\"paywall\">Facebook isn\u2019t the only company hungry for data on what consumers are doing on their phones. Google used Apple\u2019s enterprise program to distribute an app called <a href=\"https:\/\/techcrunch.com\/2019\/01\/30\/googles-also-peddling-a-data-collector-through-apples-back-door\/\" target=\"_blank\">Screenwise Meter<\/a>, which also acts like a VPN. In exchange for letting the tech giant collect and analyze their network traffic, Google <a href=\"https:\/\/support.google.com\/audiencemeasurement\/answer\/7568054?hl=en&amp;ref_topic=7648088\" target=\"_blank\">provides<\/a> participants with gift cards to various retailers. It\u2019s part of a wider Google consumer behavior program where participants can install tracking software on their router, laptop browser, and television. The difference is that the Google app doesn\u2019t require users to install a root certificate\u2014meaning they can\u2019t look at encrypted traffic. Still, Google wasn\u2019t complying with Apple\u2019s rules either, and it has now disabled the iOS version of Screenwise.<\/p>\n<p class=\"paywall\">&quot;The Screenwise Meter iOS app should not have operated under Apple\u2019s developer enterprise program\u2014this was a mistake, and we apologize,\u201d a Google spokesperson said in a statement. \u201cWe have disabled this app on iOS devices. This app is completely voluntary and always has been. We\u2019ve been upfront with users about the way we use their data in this app, we have no access to encrypted data in apps and on devices, and users can opt out of the program at any time.\u201d<\/p>\n<p class=\"paywall\">While Facebook\u2019s app is particularly invasive, a number of other companies also pay or reward users in exchange for information about what they do online, like the data giant <a href=\"https:\/\/computermobilepanel.nielsen.com\/cmp\/landingeng.jsp\" target=\"_blank\">Nielsen<\/a>. In every case, people voluntarily download these apps and programs, though they may not always understand the full extent of the access they are granting\u2014especially if they\u2019re not even 18.<\/p>\n<p class=\"paywall\">Even if you don\u2019t plan to make money by selling your data, Facebook\u2019s latest privacy scandal is a good reminder to be wary of mobile apps that <a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">aren\u2019t available for download in official app stores<\/a>. It\u2019s easy to overlook how much of your information might be collected, or to accidentally install a <a href=\"https:\/\/www.wired.com\/story\/imposter-fortnite-android-apps-already-spreading-malware\/\">malicious version<\/a> of <em>Fortnite<\/em>, for instance. VPNs can be great privacy tools, but many free ones sell their users\u2019 data in order to make money. Before downloading anything, especially an app that promises to earn you some extra cash, it&#x27;s always worth taking another look at the risks involved.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/facebook-research-app-root-certificate\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c522412f254572cc21b8235\/master\/pass\/fbvpn-01%20(1).jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Thu, 31 Jan 2019 01:15:12 +0000<\/strong><\/p>\n<p>Until Apple revoked its privileges Wednesday, Facebook was paying iOS users $20 a month to download and install the data-sucking application. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14469","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14469"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14469\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14469"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}