The stolen private data can be used against the respective UC Browser users by criminals, authorities, or other third parties. So, anyone with access to the data traffic can identify users and their devices. The shocking thing is that all the data is sent with little or no encryption. Alibaba’s analytics tool Umeng also sends device identifiers to a remote location. The browser’s AMAP component, an Alibaba mapping tool, sends device and user identifiers, as well as location data to a remote server. They analyzed both WiFi and cellular network data traffic of the browser. The Chinese version was even more vulnerable. In its analysis, Citizen Lab found that both English and Chinese-language versions of the browser leaked personally identifiable information such as location, search details, and device numbers to third parties.
0 Comments
Leave a Reply. |