• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

TikTok Engaging in Excessive Data Collection

You are here: Home / General Cyber Security News / TikTok Engaging in Excessive Data Collection
July 18, 2022

TikTok has been engaging in excessive facts collection and connecting to mainland China-dependent infrastructure, Internet 2. has claimed in a new white paper.

The most current report, overseen by Internet 2.0’s head security engineer Thomas Perkins, is an evaluation of “the resource code of TikTok mobile applications Android 25.1.3 as perfectly as IOS 25.1.1”, with Internet 2. carrying out static and dynamic testing in between 1 July to 12 July 2022 that targeted on machine and consumer information collection.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The report determined various circumstances of unwarranted knowledge harvesting, including:

  • Machine mapping
  • Hourly checking of machine area
  • Persistent calendar accessibility
  • Continuous requests for entry to contacts
  • Machine facts

Intensifying the overreach issue is the sheer quantity of buyers on TikTok and its popular market place posture, where by in accordance to the report the application has over 1 billion lively buyers globally as of September 2021.

The whitepaper goes on to notice that TikTok IOS 25.1.1 has a server relationship to mainland China, which Internet 2. believe that is operate by Chinese cyber security and information corporation Guizhou Baishan Cloud Technology Co., Ltd. Regardless of TikTok asserting that person facts is stored in Singapore and the US, the report identified proof of “many subdomains in the IOS application resolving all all-around the world”. This involved Sydney, Adelaide and Melbourne (Australia), Utama and Jakarta (Indonesia), Kuala Lumpur (Malaysia), and Baishan (China). The report’s examination could not confidently determine “the intent for the China Server link or where by person facts is saved.”

The paper concluded by stating that for TikTok to run correctly, most of the observed obtain and gadget facts assortment is pointless, with the application able to run productively “without any of this details remaining gathered.” From this, Internet 2. deduced that the sole intent this information is being collected is for information harvesting. The report’s conclusion also mentioned the application’s persistent behaviour of inquiring for end users to reverse their preference decisions to access sought-following details.   

Internet 2. place all of their investigate to TikTok for comment and verification. Even so, the software company refused to go on the record about the information of their China-based infrastructure.


Some pieces of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News TikTok Engaging in Excessive Data Collection
Next Post: DCMS Sets Out Proposal For New AI Rulebook Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.