Study Findings Inspire Privacy Protection iOS App

In a recent study done by computer scientists from the University of California in San Diego, it was discovered that close to half of the number of Apple iOS applications have access to the unique identifier about the devices where they were downloaded.

With that information, application vendors and advertising networks can determine the behavior of the users from variety of applications in their device, which includes iPads and iPhones. In fact, some apps have the power to associate the device’s identifier to the user’s personal information and email.

Even though the Apple’s App Store has restricted new applications or updates that have the capacity to gain the unique identifier four months ago, the applications who can still do such are still present.

The findings in the study has encouraged the researchers to develop and application of their own that allows users to be aware of their personal information that is being tried to access by the apps in their mobile devices. This app is called ProtectMyPrivacy, also known as, PMP.

Here’s a little idea on how the said application works. If for instance an app that functions similar to a GPS, or probably a mapping device is used, the user will be informed that the app will try to access their location. The user will then have a choice whether to allow or deny that access depending on how they think that information will be necessary for the app to perform.

Location is just one of the information that, when tried to be accessed, will be notified to the user. Photos and contacts can also be protected through PMP.

But the loophole in the app is that it will not notify the user if the unique identifier is being accessed.

The researchers’ main intention for the application is to encourage and empower users to be responsible and take control of their private information, that privacy should be a choice that the users should have.

Though the application may still have room for improvement, it has indeed become a stepping-stone in getting the necessary protection for users of technological advancements.

Leave a Comment