A new research report from @seanodiggity and @expressvpn in honor #DataPrivacyDay
reveals the incredible extent of commercial location tracking hidden in everyday apps.
https://www.expressvpn.com/digital-security-lab/investigation-xoth
1/

https://www.expressvpn.com/digital-security-lab/investigation-xoth
1/
App vendors use free software development kits (SDKs) to build their products, not realizing (or not caring) that the SDKs come from commercial surveillance companies that harvest all their users' data and sell it in hidden, sprawling commercial markets.
2/
2/
That's how the US military was able to buy location data on users of a Muslim prayer app: the app was built with one of these surveillance SDKs, so the data was extracted, packaged and sold on the cheap to the Pentagon.
https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x
3/
https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x
3/
The survey encompasses 450 apps with 1.7b downloads. It found that messenger apps (including many masquerading as Wechat, FB Messenger, and Telegram) were rife with location tracking. Other major offenders include dating and social apps.
4/
4/
The sleaziest vendors are also the most prolific. X-Mode (a company theoretically banned from app stores) is in 44% of the analyzed apps. X-Mode is especially prevalent in religious apps, especially Islamic ones.
Other prominent offenders include Oneaudience and Quadrant.
5/
Other prominent offenders include Oneaudience and Quadrant.
5/
The researchers did me the honor of naming their report Project Xoth - Xoth is the name of one of the sinister commercial surveillance companies in Attack Surface, the third Little Brother book.
http://attacksurface.com
eof/
http://attacksurface.com
eof/