Smartphone flashlight apps for Android devices and security threats they may pose.
Read more at http://www.snopes.com/computer/internet/flashlight.asp#zgBTdQZeiHLMQyla.99
See video at: www.youtube.com/embed/Q8xz8xKEFvU
On 1 October 2014, cybersecurity company SnoopWall released a “threat assessment report” discussing flashlight apps for Android devices and security threats they may pose. According to SnoopWall (who recommends using their flashlight instead of competitors’ apps) the list of permissions required by most flashlight apps is proof that the apps’ makers are harvesting data and sending it abroad to cybercriminals.
Davis, Gary. “Flashlight App Steals Data, Leaves Users in Dark.” McAfee Blog Central. 9 December 2013.
Fox-Brewster, Tom. “Check the Permissions: Android Flashlight Apps Criticised Over Privacy.” The Guardian. 3 October 2014.
McMillan, Robert. “The Hidden Privacy Threat of … Flashlight Apps?” Wired. 21 October 2014.
A Federal Trade Commission (FTC) complaint against the developer of a popular flashlight app has raised security concerns, but the full extent of vulnerabilities with other flashlight apps hasn’t been verified by the TruthorFiciton.com team.
A report released by the cyber security and software firm Snoopwall in October 2014 brought alleged security and privacy issues with flashlight apps to the forefront. The report cited widespread privacy and security issues with the top 10 free flashlight apps on the market, but those claims remain unconfirmed.
In its report, Snoopwall encouraged users to download its own flashlight app, the SnoopWall Privacy Flashlight. That prompted the TruthOrFiction.com team to contact the company for information about specific threats posed by the other free flashlight apps, as well as information on how the report ensured market competition was fairly evaluated. Future updates will be posted here.
But at least one of Snoopwall’s claims is true. The FTC filed a complaint against the developer of a Google Android app called the Brightest Flashlight in 2013. The app’s developer, GoldenShores Technologies, was accused of failing to disclose that users’ personal information was collected and distributed to third parties like advertising networks. The company settled the complaint in December 2013 and agreed to disclose how, when and why geo-location information was collected, and how consumer information would be used going forward.
“When consumers are given a real, informed choice, they can decide for themselves whether the benefit of a service is worth the information they must share to use it,” FTC Director Jessica Rich said. “But this flashlight app left them in the dark about how their information was going to be used.”
Regulatory agencies haven’t, however, made any issues with other mobile flashlight developers public.
SIDE ISSUE YOUR CAR
1. snopes.com: Code Grabbers and Remote Keyless Entry •••
Warning about thieves using ‘code grabbers’ to record remote keyless entry signals.
…crowded parking lots with some sort of device, and when they see your lights flash, meaning they’ve made a hit, they help themselves. The only way to…
…data and replicating a device to produce a correct entry code, its application to boosting valuables from cars in parking lots would be rather limited….
Sun, 23 Nov 2014 12:19:53 GMT http://www.snopes.com/autos/techno/lockcode.asp