• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Beware of App data collection

October 10, 2018 by Frederic D Rohrer 2 Comments

https://medium.com/@kahunalu/under-the-hood-airbnb-9aceb8954f8a

Apps such as AirBnB collect a plethora of data, some of which is completely useless to the company itself. For example, the app detects the direction that the device is facing, gathered from the magnetic sensor. This information is then sent server-side. Other information is collected by third party providers through their app integration. Services such as the facebook login option gather this data, whether you use the Facebook login or not.

One way to protect yourself is to block these server’s DNS queries. You can do that by installing a DNS sinkhole in your network. These can be small devices such as a pi-hole (https://pi-hole.net/) or a virtualized option. You then just point your DNS server to the new device.

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Comments

  1. Xinteng Chen says

    October 10, 2018 at 2:13 pm

    Hi Frederic

    Thanks for sharing the information Airbnb is a commonly used application. Users enter the personal information to get housing services. It is important for users to know the risks of information leakage. The article provides solutions to reduce the risks. This can be done by stopping the DNS server they use from resolving the following names: api3.siftscience.com, notify.bugsnag.com, graph.facebook.com, and *.mparticle.com.

    Log in to Reply
  2. Yingyan Wang says

    October 10, 2018 at 4:45 pm

    Hi Frederick,

    I think it is important for people to be aware of App data collection and also important to know the impact brought by data leakage. Apps are always collecting data from its users and most of us do not know what specific data they collect and how will they use it. It is good to know the solutions provided in this article.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2026 · Magazine Pro Theme on Genesis Framework · WordPress · Log in