{"id":6603,"date":"2017-02-13T09:10:27","date_gmt":"2017-02-13T17:10:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/13\/news-422\/"},"modified":"2017-02-13T09:10:27","modified_gmt":"2017-02-13T17:10:27","slug":"news-422","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/13\/news-422\/","title":{"rendered":"Always read the EULAAARGH: Part 1"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 13 Feb 2017 16:00:13 +0000<\/strong><\/p>\n<p>Last November, I gave a talk in Ireland at the fantastic <a href=\"http:\/\/www.iriss.ie\/IRISSCON.html\" target=\"_blank\">IRISSCON<\/a>, a huge annual\u00a0security conference which covers everything from social engineering and use of language to the criminal underground and heart hacking.<\/p>\n<p>My talk was all about EULAs, or at least, it used EULAs as a starting point before quickly moving into the land of mobile and the\u00a0crazy assortment of Privacy Policies on offer.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-template-rage.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-15573\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-template-rage-283x300.jpg\" alt=\"EULAAARGH\" width=\"283\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-template-rage-283x300.jpg 283w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-template-rage-567x600.jpg 567w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-template-rage.jpg 582w\" sizes=\"auto, (max-width: 283px) 100vw, 283px\" \/><\/a><\/p>\n<h3><strong>What is a EULA?<\/strong><\/h3>\n<p>The EULA is an End User License Agreement and generally sets out things like your ability to use, copy (or indeed, not copy) the product sitting in front of you. More often than not, there&#8217;ll be a Terms of Service which explains what you can do while using the product, a sort of &#8220;what you can reasonably expect to take place while the wheels are in motion&#8221;. These can\u00a0be more important in mobile land than on a desktop, where apps and software as a service reign supreme.<\/p>\n<p>The last piece of the puzzle is the Privacy Policy, which explains what happens to your PII, where it is stored, and what the company responsible for it will do to safeguard the information. These are often very, very important where mobile is concerned &#8211; indeed, on the pages of Google Play you&#8217;ll very rarely see a EULA listed, whereas the Privacy Policies are always on the page, visible and linked (if you do see a EULA, it&#8217;ll probably pop up at install in the app itself). Here&#8217;s an example of a Privacy Policy linked on a Play Store app page:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/link-to-pp.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-15575\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/link-to-pp-300x205.jpg\" alt=\"Links to Privacy Policy\" width=\"300\" height=\"205\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/link-to-pp-300x205.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/link-to-pp-600x410.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/link-to-pp.jpg 671w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Where this gets interesting is that Privacy Policies are typically all about the adverts, tracking, and analytics you can expect to run into on your travels. Just like websites, ads are usually how free games make their money &#8211; regardless of whether or not they use in-app purchases. I&#8217;ve written about Advergaming many times &#8211; here&#8217;s 5 blogs for you to get your teeth into:<\/p>\n<p>Part 1: <a class=\"external\" href=\"http:\/\/www.gfi.com\/blog\/advergaming-and-you-part-1\/\" target=\"_blank\">Introduction<\/a><br \/> Part 2: <a class=\"external\" href=\"http:\/\/www.gfi.com\/blog\/advergaming-and-you-part-2\/\" target=\"_blank\">The Location and Design of In-Game Advertisements<\/a><br \/> Part 3: <a class=\"external\" href=\"http:\/\/www.gfi.com\/blog\/advergaming-and-you-part-3\/\" target=\"_blank\">The Gamification of Gamers<\/a><br \/> Part 4: <a class=\"external\" href=\"http:\/\/www.gfi.com\/blog\/advergaming-and-you-part-4\/\" target=\"_blank\">Hotfixes and Notfixes<br \/> <\/a>Part 5: <a href=\"https:\/\/blog.threattrack.com\/advergaming-and-you-part-5\/\" target=\"_blank\">EULAs and You<\/a><\/p>\n<p>Previously, device owners could try and bypass adverts on their devices through all manner of antics &#8211; here&#8217;s people using OpenDNS to <a href=\"https:\/\/www.reddit.com\/r\/gaming\/comments\/n5831\/how_to_block_xbox_dashboard_ads\/\" target=\"_blank\">block Xbox dashboard ads<\/a> &#8211; so it was inevitable that adverts would eventually become something you can&#8217;t get around anymore. Behold, the advert as a game mechanic:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue.jpg\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-16361\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue-300x300.jpg\" alt=\"continue\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue-300x300.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue-150x150.jpg 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue-600x600.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/continue.jpg 1080w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Yeah, there&#8217;s no way to dodge that. There&#8217;s a weird grey area where parents let their kids download \/ play all manner of things on their devices, or buy tablets specifically for the children to use, so they&#8217;re &#8220;theirs&#8221; but the data on the device is a mashup of both parent and child. Some games need registration, logins, permission from an adult over 13 years of age and so on. With that in mind, it&#8217;s quite important to ensure you know where your data is going, which is probably why Privacy Policies are such a big deal.<\/p>\n<p>I&#8217;m not sure how many successful EULA challenges have passed muster in a court of law, but anything involving leakage\/theft\/bad things in general related to PII never tend to go well for the offending party. That&#8217;s probably why we end up with such a headache when trying to deal with companies attempting to cover themselves from unwarranted blame, because that way lies madness &#8211; and lots of words.<\/p>\n<h3>The problem with words<\/h3>\n<p>In an ideal world, the perfect EULA would combine the EULA, ToS, and Privacy Policy in one bundle of amazing and look like this:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-1.jpg\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-15576\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-1.jpg\" alt=\"EULA, done and dusted\" width=\"357\" height=\"507\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-1.jpg 357w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-1-211x300.jpg 211w\" sizes=\"auto, (max-width: 357px) 100vw, 357px\" \/><\/a><\/p>\n<p>Unfortunately, this isn&#8217;t possible.<\/p>\n<p>Most mobile games make use of multiple advertisers\/networks, and some are region specific so what you see in country A won&#8217;t be what you see in country B. As a result, you end up flowing down a river of &#8220;here&#8217;s two more links to two more policies &#8211; and both of those links to some of their partners, so here&#8217;s a few more &#8211; and this &#8211; and that &#8211; and one of these&#8221;.<\/p>\n<p>Essentially, the EULA is the bit you get out of the way to introduce the meaty privacy policy, and beyond the &#8220;Agree\/Disagree&#8221; it functions as little more than a gateway to the complicated stuff.<\/p>\n<p>Here is your 2017 experience:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-2.jpg\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-15577\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-2-300x224.jpg\" alt=\"oh no\" width=\"300\" height=\"224\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-2-300x224.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-2-600x448.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/eula-2.jpg 949w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>LOL indeed.<\/p>\n<p>Incredibly important information about what&#8217;s happening to your data is often not placed in\u00a0the app itself, because the app maker wants you to get right into the act of making them some money and tons of words would be a bit of a distraction, and worse still, the app maker is relying on the ad network\/provider\/whoever to actually have the correct information available, online, in an easy to digest format. Effectively, you&#8217;re seeing a EULA at app launch, but the PII references are all sitting on a website somewhere &#8211; or, even more confusingly, a whole bunch of third-party websites.<\/p>\n<p>Did you read it all? Of course you did.<\/p>\n<p>At time of writing (well, at time of putting together the slide deck) the top games on the Play store were as follows:<\/p>\n<p><strong>Design Home<\/strong>: 2147 word Privacy Policy<br \/> <strong>Taps to Riches<\/strong>: 1245 words<br \/> <strong>Block! Hexa Puzzle<\/strong>: 678 words<br \/> <strong>Rolling Sky<\/strong>: 586 words<br \/> <strong>Pineapple Pen<\/strong>: No privacy policy listed on Google Play or the developer&#8217;s own homepage. This surprised me, as I was under the impression every app needed one listed. The best I could come up with is the below text taken from the Play developer&#8217;s information portal:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/no-policy.jpg\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-15578\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/no-policy-300x188.jpg\" alt=\"No policy\" width=\"300\" height=\"188\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/no-policy-300x188.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/no-policy-600x375.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/no-policy.jpg 1025w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Essentially, if\u00a0it&#8217;s decided that the app doesn&#8217;t handle what is considered to be PII, then it doesn&#8217;t need to list anything. You can see the problem here; without any form of information whatsoever with regards what the app is doing with said data (outside of notifications related to what device functions it may make use of), there is no way for the consumer to make an informed decision.<\/p>\n<p>Interestingly, Google Play has now decided to <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/02\/10\/google-set-to-purge-play-store-of-apps-lacking-a-privacy-policy\/\" target=\"_blank\">purge apps with no Privacy Policy on offer<\/a>\u00a0&#8211; one fears for the health of those pineapples.<\/p>\n<p>Elsewhere, we have Privacy Policies ranging from 500 words to just over 2,000. There are various readability tests which will try to establish how complicated a piece of text is; these can take in very complicated mathematical equations, or look at what % of words contain more or less than 7 letters, or compare the whole text against a set of a couple of thousand &#8220;common&#8221; words, and increase the complexity score every time words appear which aren&#8217;t listed.<\/p>\n<p>There are plenty of online readability score checkers you can run text through [<a href=\"https:\/\/readable.io\/text\/\" target=\"_blank\">1<\/a>], [<a href=\"http:\/\/www.thewriter.com\/what-we-think\/readability-checker\/\" target=\"_blank\">2<\/a>], [<a href=\"http:\/\/www.makeuseof.com\/tag\/writing-reader-friendly-check-8-readability-testing-web-tools\/\" target=\"_blank\">3<\/a>], and typically you&#8217;ll find the scores peg the Privacy Policies at close to (or above) graduate level.<\/p>\n<p>This makes sense &#8211; it&#8217;s legalspeak, and legalspeak is complicated. Sites and services have occasionally tried to tackle this particular beast, with mixed results &#8211; for our part, we offer non-legal, hopefully easy to understand text next to the complicated bits in our own <a href=\"https:\/\/www.malwarebytes.com\/privacy\/\" target=\"_blank\">Privacy Policy<\/a>.<\/p>\n<p>Unfortuntely, in certain circumstances there may just be too many words to deal with to gain a firm understanding of exactly what you happen to be dealing with. In the follow-up post, you&#8217;ll see exactly what I mean.<\/p>\n<p>Bring some background\u00a0music, a soft bedside light and a large pair of reading glasses.<\/p>\n<p>You&#8217;ll need them.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Christopher Boyd<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/always-read-the-eulaaargh-part-1\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 13 Feb 2017 16:00:13 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/always-read-the-eulaaargh-part-1\/' title='Always read the EULAAARGH: Part 1'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/pexels-photo-261664.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Part one of two blogs covering a talk given at IRISSCON in November 2016. How much do you really know about EULAs and Privacy Policies?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/conferences-security-world\/\" rel=\"category tag\">Conferences<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/eula\/\" rel=\"tag\">EULA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-play\/\" rel=\"tag\">Google Play<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/irisscon\/\" rel=\"tag\">IRISSCON<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security\/\" rel=\"tag\">security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terms-of-service\/\" rel=\"tag\">terms of service<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tos\/\" rel=\"tag\">ToS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/always-read-the-eulaaargh-part-1\/' title='Always read the EULAAARGH: Part 1'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10756,11317,11268,11318,5897,714,10497,11319,11320],"class_list":["post-6603","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-conferences","tag-eula","tag-google-play","tag-irisscon","tag-privacy","tag-security","tag-security-world","tag-terms-of-service","tag-tos"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6603"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6603\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6603"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}