Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Cellphones Android China Privacy Your Rights Online

F-Secure: Xiaomi Smartphones Do Secretly Steal Your Data 164

They may be well reviewed and China's new top selling phone, but reader DavidGilbert99 writes with reason to be cautious about Xiaomi's phones: Finnish security firm F-Secure has seemingly proven that Xiaomi smartphones do in fact upload user data without their permission/knowledge despite the company strongly denying these allegations as late as 30 July. Between commercial malware and government agencies, how do you keep your phone's data relatively private?
This discussion has been archived. No new comments can be posted.

F-Secure: Xiaomi Smartphones Do Secretly Steal Your Data

Comments Filter:
  • Obligatory (Score:2, Informative)

    by Anonymous Coward

    "By not having one" comment

  • by sjwt ( 161428 ) on Sunday August 10, 2014 @01:17AM (#47640583)

    One could always try one of these...

    Nice little phone [photobucket.com]

  • Normal now (Score:5, Insightful)

    by Mitreya ( 579078 ) <mitreya.gmail@com> on Sunday August 10, 2014 @01:18AM (#47640585)

    Xiaomi smartphones do in fact upload user data without their permission/knowledge

    Considering that half the apps out there (and I mean benign/legitimate apps!) seem to upload user data without user's knowledge, that is not so shocking. Once you start using your phone, several apps will start siphoning your data.

    Recent "simplification" of Android Google-store permissions means that I don't even know how much of a permission I am giving to a new app.

    • Re:Normal now (Score:4, Informative)

      by Zumbs ( 1241138 ) on Sunday August 10, 2014 @03:11AM (#47640791) Homepage

      Considering that half the apps out there (and I mean benign/legitimate apps!) seem to upload user data without user's knowledge

      Half? Try 99% of the top 400 apps [appthority.com] on both Android and iPhone. I also seem to remember that Apple got into problems because they were uploading user data without permission.

      • by Anonymous Coward

        Did you actually read that report? Most of the items on the list have nothing to do with uploading user's data.

        • by Zumbs ( 1241138 )
          The most commonly uploaded data is location data (followed by identification using IMEI/UDID). In my book that is user data, but you are free to disagree.
          • So should "find restaurants near me" apps instead require users to download the complete list of worldwide restaurants? Because even clicking on a map or entering a postal code is "location data". Another is to satisfy movie studios that refuse to license works for streaming unless the provider can positively match viewers to a country whitelist.
            • by Anonymous Coward

              No. But "flash light" apps shouldn't. You're confusing a legitimate need for an app to require access to data with an app that requires access to data it should never use.

              But there's no way to say "block this access", you either have to accept everything the app asks for, or refuse to install it.

      • by AmiMoJo ( 196126 ) *

        I also seem to remember that Apple got into problems because they were uploading user data without permission.

        Indeed, and in fact what F-Secure found is that the phone sense the IMSI and SIM's phone number to a server via a HTTP request. The lack of encryption is rather poor but in terms of what data it sent it is actually far less than what Apple was caught doing.

      • by Kjella ( 173770 )

        Those numbers look clearly inflated to sell their own consulting reports and services. Like in-app purchases, so because Angry Bird lets you buy the Mighty Eagle it has a "risky behavior"? Oh please. It'd be easier to take serious without the hyperbole.

      • Re:Normal now (Score:5, Informative)

        by sribe ( 304414 ) on Sunday August 10, 2014 @08:38AM (#47641491)

        I also seem to remember that Apple got into problems because they were uploading user data without permission.

        Nope. They got into trouble because somebody found location data in logs on the phone, and assumed it was being uploaded without actually testing that theory.

        • by Shoten ( 260439 )

          I also seem to remember that Apple got into problems because they were uploading user data without permission.

          Nope. They got into trouble because somebody found location data in logs on the phone, and assumed it was being uploaded without actually testing that theory.

          Right...and even then, this was location-based information that Apple said the phone wasn't collecting. It could just as easily have been a misunderstanding about underlying software behavior at a low level (or even that the programmer who built it that way didn't even work at Apple any longer) as anything else.

          • by tlhIngan ( 30335 )

            Right...and even then, this was location-based information that Apple said the phone wasn't collecting. It could just as easily have been a misunderstanding about underlying software behavior at a low level (or even that the programmer who built it that way didn't even work at Apple any longer) as anything else.

            It wasn't collecting the data. It was caching the data. Basically you go to a new area, the iPhone sends the MAC addresses of WiFi APs it sees, and Apple sends back a list of APs in the area and thei

    • Re:Normal now (Score:4, Insightful)

      by Z00L00K ( 682162 ) on Sunday August 10, 2014 @03:41AM (#47640839) Homepage Journal

      The only way around it is to avoid storing sensitive data on the phone.

      This must also be an important issue for those that uses phones as security tokens, i.e. banks and other important institutions that sends an SMS with credentials to provide verification - it's a very insecure solution since the phone may have an app that forwards the credentials to a third party that can use this to access the system.

      • by Shoten ( 260439 )

        The only way around it is to avoid storing sensitive data on the phone.

        This must also be an important issue for those that uses phones as security tokens, i.e. banks and other important institutions that sends an SMS with credentials to provide verification - it's a very insecure solution since the phone may have an app that forwards the credentials to a third party that can use this to access the system.

        Avoid storing sensitive data...like the phone numbers of other people? Like the text messages you send? Just using this phone...to make phone calls, mind you...results in data being uploaded. I don't see how "not having that data" on your phone is really an option. It's a goddamned phone; you're going to have to use it, some day.

      • Location data and contact/address data are sensitive yet inextricably linked to how people use trackers (also known as cell phones and other portable electronic devices). Whether the device conveys GPS coordinates, can be tracked to a remarkably small area via cell tower triangulation, or unknown (to the user) parties get the information from a proprietor (such as Apple [consumerist.com]), the privacy loss inherent in ordinary tracker operation makes it impossible to "avoid storing sensitive data on the phone".

        This is no acc

      • by AK Marc ( 707885 )

        an app that forwards the credentials to a third party that can use this to access the system.

        So if I'm sending a bank transfer, I have to log in to the bank site, usually on a separate computer. The bank sends me an SMS with a one-time-use code to put in for verification. If that code is made public, there's no use for it. It doesn't hurt me if everyone on the planet can see it. They'd need to have already hacked my bank account for it to matter. And the moment I use it, it's useless. And if they do hack my account, the texts to me that give me the confirmation code will get me to call my ban

    • Considering that half the apps out there (and I mean benign/legitimate apps!) seem to upload user data without user's knowledge, that is not so shocking. Once you start using your phone, several apps will start siphoning your data.

      Since when is spyware legitimate or benign?

      Recent "simplification" of Android Google-store permissions means that I don't even know how much of a permission I am giving to a new app.

      If by "permissions" you mean non-negotiable demands... I forget there are still people who don't have operating systems which let them configure actual permissions.

  • by Rosco P. Coltrane ( 209368 ) on Sunday August 10, 2014 @01:28AM (#47640605)

    I want it totally private. Has the concept of privacy gotten so totally lost that people seem okay to settle for relative privacy?

    By the way, the best way to keep your data private is to keep it out of your untrusted phone/computer/whatnot, and use bogus data when you need to enter something.

    Exemples: use "Acme inc." as your home phone number's name in your addressbook, and nicknames for your contacts. Don't enter your full address as your home in your satnav's app but someone's address in a street close-by, etc.

    • Comment removed (Score:5, Insightful)

      by account_deleted ( 4530225 ) on Sunday August 10, 2014 @02:51AM (#47640757)
      Comment removed based on user account deletion
      • by AmiMoJo ( 196126 ) *

        Apple, Google & Co already have your details, whether you use their service or not.

        It is illegal to use such data in the EU. They can store it on the user's behalf (cloud service), but to use it themselves they need permission of the subject of the data which clearly they don't have. Building "shadow profiles" is illegal here.

      • Unfortunately, that won't help. Your phone number(s) and your home address are already on many of your friend's devices under your real name. Apple, Google & Co already have your details, whether you use their service or not. It should be easy for them to filter out bogus data and associate your number with your real name.

        The whole system from top to bottom is inherently non-private. Get yourself a phone number/device, and they have your name and address for billing. Use that smartphone and the very nature of cellular is that you are located to a tower. And GPS even furthers your location accuracy.

        There is no privacy, it was not designed to be private. And extraordinary measures to be anonymous simply attract attention.

    • I want it totally private. Has the concept of privacy gotten so totally lost that people seem okay to settle for relative privacy?

      By the way, the best way to keep your data private is to keep it out of your untrusted phone/computer/whatnot, and use bogus data when you need to enter something.

      Exemples: use "Acme inc." as your home phone number's name in your addressbook, and nicknames for your contacts. Don't enter your full address as your home in your satnav's app but someone's address in a street close-by, etc.

      If you want privacy, don't use an address book, memorize your friends numbers. On that topic of friends, don't have more than two friends. That will minimize your exposure. The first one can be called Mr. White and the second one Mr. Black, and again, don't be lazy, do not enter their nickname into the address book.

      Do not use gps navigation, get yourself an old fashion magnetic compass. Magnetic compasses have worked for centuries. And they'll keep on being useful for many centuries to come. Turn on your p

      • If you want privacy, don't use an address book, memorize your friends numbers. On that topic of friends, don't have more than two friends. That will minimize your exposure. The first one can be called Mr. White and the second one Mr. Black, and again, don't be lazy, do not enter their nickname into the address book.

        Do not use gps navigation, get yourself an old fashion magnetic compass. Magnetic compasses have worked for centuries. And they'll keep on being useful for many centuries to come. Turn on your phone only at specific hours on certain dates. The rest of the time, keep your phone turned off, battery removed, and the phone tucked away in a Tesla envelope (along with some extra sim cards). And if someone ever comes knocking on your door, or calls you by mistake, you're a Jehova's Witness and you're into Multi-Level-Marketing.

        That's what I would call total privacy, and even then it wouldn't be completely total.

        Dude! you forgot the Sextant, a fine and secure way of location.

        • But only useful in one dimension on it's own - you'll also need an accurate pocket watch as to be able identify your longitude.

      • don't use an address book, memorize your friends numbers

        Useless since they keep logs of who you called.

        don't have more than two friends. That will minimize your exposure

        It also means you can be safely disposed of without anyone caring a fuck.

  • by Animats ( 122034 ) on Sunday August 10, 2014 @01:51AM (#47640635) Homepage

    So far, all they've found it doing is reporting the IMEI by sending an HTTP GET http://api.account.xiaomi.com/pass/v3/user@id?type=MXPH&externalId=01 [xiaomi.com], The data is transmitted as a cookie of the form deviceId=IMEI . (The API returns a brief reply in JSON.) That tells them the phone has connected to the phone network, and its IP address. That's not particularly interesting information. The carrier knows the IMEI number, too, of course. Perhaps this is to check up on whether carrier-reported sales data matches actual phones coming on the air.

    Carriers, app vendors, Microsoft, Google, and Apple collect far more data than that. There are way too many things phoning home with the user's contact list and other personal info.

    • But it's China.

      You know. The evil communists.

      Well, ok, they're not communists any more. But they're still socialists, and that's almost as evil.

      Of course the NSA is evil, too, but they're American, so they're ok. Rah, rah, rah, USA!

    • So far, all they've found it doing is reporting the IMEI by sending an HTTP GET http://api.account.xiaomi.com/... [xiaomi.com], The data is transmitted as a cookie of the form deviceId=IMEI .

      Carriers, app vendors, Microsoft, Google, and Apple collect far more data than that. There are way too many things phoning home with the user's contact list and other personal info.

      This is about the point where the boiling frog's brain begins to turn to mush.

  • by Nyder ( 754090 ) on Sunday August 10, 2014 @02:06AM (#47640651) Journal

    Look, these days if you want to be safe, do not use a smartphone. Get a dumb phone, then you don't have to worry about any apps leaking your data.

    Either an app will leak your data, someone will hack your phone, you leave it somewhere or someone steals it. Either way, you are screwed if you use your phone for all sorts of personal/business stuff.

    I guess it's about convenience over personal/financial/business safety.

    • Using a dumb phone is not a solution. Everything a dumb phone does, by which I mean mainly messaging and phone calls, can be monitored anyway, as well as the location of the phone, by triangulation. All this means is that you lose features with implied privacy issues by going from a smart to a dumb phone, but are left with the remaining features that also have privacy issues.
  • by bolt_the_dhampir ( 1545719 ) on Sunday August 10, 2014 @02:08AM (#47640655)
    It's as simple as that. It doesn't matter if you turn on mobile data as long as that is under the control of the phone's operating system, and it doesn't matter if you pay attention to your cell phone bill, as traffic to and from specific government servers is likely exempt from the monthly traffic calculations just as the provider's own servers are likely to be. It doesn't matter if you monitor your wireless network, since questionable transmissions are likely to only go through mobile data, as that's harder to monitor.

    While you may be able to test this with your own base station, the phone might also detect that it's not on an official network and therefore not do anything, but that's probably taking it a bit far.

    While you could switch to a "dumb" phone, those are of course also trackable, and your conversations and messages can still be monitored, so I don't see any real gain there.

    Myself, I carry a phone with me all the time, but I simply do not treat it as a secure device. If you want to take private pictures with your girlfriend, for instance, your phone is not the camera you want to use. End of story.
    • It's as simple as that. It doesn't matter if you turn on mobile data as long as that is under the control of the phone's operating system, and it doesn't matter if you pay attention to your cell phone bill, as traffic to and from specific government servers is likely exempt from the monthly traffic calculations just as the provider's own servers are likely to be. It doesn't matter if you monitor your wireless network, since questionable transmissions are likely to only go through mobile data, as that's harder to monitor.

      Trust is subjective/context dependent and tcpdump works just fine on mobile interfaces from an Android terminal.

      I trust Cyanogenmod as much as I trust most any generic Linux distro with a few minor tweaks (baseband without shared memory)

      Myself, I carry a phone with me all the time, but I simply do not treat it as a secure device. If you want to take private pictures with your girlfriend, for instance, your phone is not the camera you want to use. End of story.

      Cameras share downsides of mobile devices (small, can be lost or stolen) and none of the upsides (No lock screens or encrypted file systems) ... where even long since deleted pictures can be recovered easily years after the fact.

      If I had a stash of pictures I didn't want get

      • Cameras share downsides of mobile devices (small, can be lost or stolen) and none of the upsides (No lock screens or encrypted file systems) ... where even long since deleted pictures can be recovered easily years after the fact

        True, except it's a lot more convenient to zero the storage of a camera than to wipe your phone's SD card, and while people tend to carry pictures around on their phones for years, I've never met anyone doing that with their actual cameras.

        I also agree Cyanogenmod is great. Too bad it doesn't support my phone well yet :(

  • There is no privacy. I knew a man who repaired pagers and police radios, etc. He worked in a small shop that was surrounded by copper screens and everything was grounded to eliminate any stray signals. Think of a clean room. So who can live like that?
  • Because the American phone manufacturers don't do the same thing?
    http://online.wsj.com/news/art... [wsj.com]

    Don't trust any company with your personal information - or accept that it's going to be shared with whoever has the money to pay for it, or the power to grab it.

  • Please, somebody tell the Chinese that this is not a feature users want, even if all the bog vendors have implemented it!

  • ...the sky is blue.

    Carry on.
  • by Anonymous Coward

    Written by people that care about your privacy.

  • Surely I'm not the only one who looks at the supercomputer in her pocket which is capable of speaker independent voice recognition, and often wonders whether encrypted text versions of *all* the conversations she's been having in its proximity are getting squirted off somewhere s33kr1t in the middle of the night, when no-one would notice a stray packet or two...

  • China can have it. (Score:4, Interesting)

    by DMJC ( 682799 ) on Sunday August 10, 2014 @03:42AM (#47640841)
    Frankly at this point, I'd rather the Chinese have my data to be honest. They won't share it with the Australian/Five eyes governments, and since I live ina Five eyes country, that works better for me. It's not like they'll put me in a prison from China for some BS they find on my phone. My own government on the other hand is much more likely to screw up my life using my own private data.
  • by Meneth ( 872868 ) on Sunday August 10, 2014 @04:17AM (#47640897)
    The data is copied, not "stolen". Get it right!
    • Indeed. :D

      No one loses anything if you make a copy!

    • The data is copied, not "stolen". Get it right!

      If you own one of these phones, you will be personally attacked by Chinese pirates who will steal trillions of dollars worth of your data!

  • by jbolden ( 176878 ) on Sunday August 10, 2014 @04:35AM (#47640953) Homepage

    Between commercial malware and government agencies, how do you keep your phone's data relatively private?

    There are 4 main smartphone brands:

    Apple is in the hardware business. Their goal is to sell you hardware with a basket of software that enhances the experiences and showcases the hardware.
    Blackberry is in the enterprise software business. Their goal is to sell you hardware that ties you to a management system from which they make their margin.
    Microsoft is in the productivity software business. Their goal is to sell you an endpoint that showcases the features of their productivity suites including their server / cloud based collaboration tools.
    Google is in the advertising business. Their goal is to sell you an endpoint that showcases their web services. Those web services are designed to collect information about you to sell to advertisers.

    Of those 4 companies which do you think you are going to have the toughest time with privacy? If you care about privacy and don't have a strong reason to pick Android, don't use Android, it is quite obviously going to have to be the worst of the 4. You are going to have to cut against the grain to be secure and be on a platform designed advertisers. The other 3 while they may have problems are all much much better on privacy. Blackberry's balance feature allows you to create a container which divides your data a secure side and an insecure side. They offer things like secure browsing by default. You want security choose an operating system designed to enhance not reduce security. Apple and Microsoft are sort of midpoints. Apple is very good about now allowing applications to upload data you don't know about sharing between apps is off by default. Microsoft emulated the Apple sandboxing, certification and limited interaction approach we'll see if overtime they maintain it. If you want to use these devices and have secure data something like Good's containers (which do work on Android) provide a pretty excellent way to keep specific data associated with specific applications secure.

    • by Kjella ( 173770 )

      Apple is in the hardware business. Their goal is to sell you hardware with a basket of software that enhances the experiences and showcases the hardware.
      Blackberry is in the enterprise software business. Their goal is to sell you hardware that ties you to a management system from which they make their margin.
      Microsoft is in the productivity software business. Their goal is to sell you an endpoint that showcases the features of their productivity suites including their server / cloud based collaboration tools.
      Google is in the advertising business. Their goal is to sell you an endpoint that showcases their web services. Those web services are designed to collect information about you to sell to advertisers.

      Apple is selling simplicity, they'll never give you the tools to manage your privacy.
      Blackberry is selling central control, a satellite designed to talk to the mothership (BES).
      Microsoft is trying to sell you Windows across the board = everything through the cloud.
      Google is like you say a data siphon, their first party services are all about market data.

      I'd say there's one black sheep and three shades of dark gray. However all of that doesn't matter nearly as much as you'd think as the real issue is third p

      • by jbolden ( 176878 )

        I disagree. Apple does a pretty good job on privacy and is concerned about it. They've already limited applications interactions and they are fairly secure by default. Their infrastructure allows additional privacy to be easily added on.

        As for Microsoft I'm not sure where you are disagreeing with me.

        • I disagree. Apple does a pretty good job on privacy and is concerned about it.

          They're so concerned about your privacy, they have three or four methods built into the phone which appear to be primarily for defeating it.

          • by jbolden ( 176878 )

            I'm not sure what you mean specifically so I can't comment on that. They seem to have a pretty good range of consumer grade privacy features that are adjustable. That's not to say that every-time there is a conflict between privacy and some other goal they optimize for privacy but they do seem to lean towards privacy and allow the privacy conscious to lean more towards privacy.

          • by sribe ( 304414 )

            They're so concerned about your privacy, they have three or four methods built into the phone which appear to be primarily for defeating it.

            Are you referring to the silly hoo-hah of a few weeks ago? Like the feature that makes an unencrypted backup of the phone's data IF THE USER REQUESTS UNENCRYPTED BACKUPS??? And the features that are not even on a normal phone, but get added when users install the developer tools???

            Yeah, that was a whole lot of noise about nothing.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Google does _not_ sell user information.

      They sell _the use_ of user information.

      It is not the same thing.

      Selling "Joe Blow works at Acme Corp and shops for sex dolls" is selling user information.

      Selling "I will advertize your sex dolls to people who shop for them" is selling the _use_ of the information. Only Google knows you are Joe Blow at Acme with an interest in sex dolls. The advertiser does not; they just get a service that makes use of Google's knowledge.

      Yes, Google knows your stuff. But they don't

      • In fact selling your information is likely to undercut their profits - why rent the cow if you can buy just the milk.

      • But by collecting the data and storing it they make it available to government requests asking for it.

    • There's one big wildcard in there though, if you buy an Android phone then the firmware can be replaced (ease depends on the model...) with open source variant that has more protections. Depending on your view of these firmwares, that might catapult it from the bottom of the pile to the top.

      • by jbolden ( 176878 )

        I don't think the problem is so much the firmware on Android. The Samsung firmware on the Galaxy is excellent from a privacy and security standpoint. The issue is the higher up layers in the stack.

    • by m00sh ( 2538182 )

      Between commercial malware and government agencies, how do you keep your phone's data relatively private?

      There are 4 main smartphone brands:

      Apple is in the hardware business. Their goal is to sell you hardware with a basket of software that enhances the experiences and showcases the hardware. Blackberry is in the enterprise software business. Their goal is to sell you hardware that ties you to a management system from which they make their margin. Microsoft is in the productivity software business. Their goal is to sell you an endpoint that showcases the features of their productivity suites including their server / cloud based collaboration tools. Google is in the advertising business. Their goal is to sell you an endpoint that showcases their web services. Those web services are designed to collect information about you to sell to advertisers.

      Of those 4 companies which do you think you are going to have the toughest time with privacy? If you care about privacy and don't have a strong reason to pick Android, don't use Android, it is quite obviously going to have to be the worst of the 4. You are going to have to cut against the grain to be secure and be on a platform designed advertisers. The other 3 while they may have problems are all much much better on privacy. Blackberry's balance feature allows you to create a container which divides your data a secure side and an insecure side. They offer things like secure browsing by default. You want security choose an operating system designed to enhance not reduce security. Apple and Microsoft are sort of midpoints. Apple is very good about now allowing applications to upload data you don't know about sharing between apps is off by default. Microsoft emulated the Apple sandboxing, certification and limited interaction approach we'll see if overtime they maintain it. If you want to use these devices and have secure data something like Good's containers (which do work on Android) provide a pretty excellent way to keep specific data associated with specific applications secure.

      Here's another heuristic.

      Apple, Microsoft and Blackberry uses closed software. Google uses open source.

      So, Android is the best choice because you (meaning a team of concerned citizens) can essentially take all the privacy leaking parts out and create a private and secure system. In the others, you are at the mercy of others who likely are to care about your privacy as much as your cat cares about your rants.

      • by jbolden ( 176878 )

        So, Android is the best choice because you (meaning a team of concerned citizens) can essentially take all the privacy leaking parts out and create a private and secure system.

        The versions used in the United States haven't had that done (mostly though some phones like Amazon's might be an exception). So what could happen and what the current state is are different. But moreover they can't really. Android as used in the USA includes the Google Play layer which is not open source and can't be modified

If all the world's economists were laid end to end, we wouldn't reach a conclusion. -- William Baumol

Working...