Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Cellphones Privacy

Motorola Is Listening 287

New submitter pbritt writes "Ben Lincoln was hooking up to Microsoft ActiveSync at work when he 'made an interesting discovery about the Android phone (a Motorola Droid X2) which [he] was using at the time: it was silently sending a considerable amount of sensitive information to Motorola, and to compound the problem, a great deal of it was over an unencrypted HTTP channel.' He found that photos, passwords, and even data about his home screen config were being sent regularly to Motorola's servers. He has screenshots showing much of the data transmission."
This discussion has been archived. No new comments can be posted.

Motorola Is Listening

Comments Filter:
  • by tomkost ( 944194 ) on Tuesday July 02, 2013 @01:39PM (#44168007)
    It seems every device, every internet service, basically every communication node that we use has been turned into something that is beyond George Orwell's worst nightmare. As long as there is continued complacency on the part of people using this technology, the invasion of privacy will continue to grow. This of course assumes that it could get much worse. The only options at this point are to stop or drastically reduce using these networks while we attempt to build our own.
  • by jader3rd ( 2222716 ) on Tuesday July 02, 2013 @01:40PM (#44168023)
    This is just Google collecting all of the worlds data, just like they said they were doing to do.
  • by Lumpy ( 12016 ) on Tuesday July 02, 2013 @01:46PM (#44168099) Homepage

    "It seems every device, every internet service, basically every communication node that we use has been turned into something that is beyond George Orwell's worst nightmare."

    Yes, if you use commercial easy to use toasters like a phone with stock android, iOS, Windows, OSX, etc on it... You are correct.

    If you want privacy and control. Run linix or one of the hacked and cleaned Android releases.

  • by erroneus ( 253617 ) on Tuesday July 02, 2013 @01:48PM (#44168125) Homepage

    You can RELOAD the device's OS with custom ROMs that don't do this crap. If it was discovered Apple does this (and who's to say they don't) what choice have you? And Windows phone? Don't even start.

    Part of the reality of "security" is taking responsibility for your own. Security is not a product you can buy. It's not something that other people can do for you (because that's tyranny). It's a personal responsibility and it takes knowledge and understanding to do. Tough luck to all those people who have neither the inclination nor the ability to learn.

  • by gstoddart ( 321705 ) on Tuesday July 02, 2013 @02:00PM (#44168291) Homepage

    How about this [cornell.edu]?

    They've gone way beyond authorized access, and are collecting information they have no business accessing.

    But somehow those EULAs magically give them the legal right to do anything they want to.

  • by SuperKendall ( 25149 ) on Tuesday July 02, 2013 @02:06PM (#44168379)

    If it was discovered Apple does this (and who's to say they don't)

    We know they don't because there are many hundreds of millions of people using Apple devices now, and lots of developers using network proxy monitoring tools in development that see all network traffic from the devices to boot.

    Basically if Apple were doing this we would have known long ago, and there would be no shortage of people to shout about it continuously on Slashdot and elsewhere.

  • by Bearhouse ( 1034238 ) on Tuesday July 02, 2013 @02:08PM (#44168409)

    What is this crap, and why do they always get it wrong?

    Yes, I do want to seamlessly sync my mail, sms and contacts across my devices.
    Except none of the solutions proposed really do that well...
    (Or maybe I'm not typical, having multiple PCs and mobile devices, including iOS and Android?)

    Photos too? Hell, why not. Picasa from Google used to be OK...

    But now, after the "success" of FB, it seems that you can't have simple sync solution anymore; everybody is pushing unwanted, privacy-leaking, "social" features down our throats.

    Just please fucking stop!

  • by TheCarp ( 96830 ) <sjc@caCOMMArpanet.net minus punct> on Tuesday July 02, 2013 @02:16PM (#44168505) Homepage

    Sigh.... they makes me more disappointed than mad, and reminds me of the phrase "The road to hell is paved with good intentions".

    They want easy sync, they want it so they can restore user data and save people's bacon whose phone gets destroyed or lost. Awesome, great intention. However, http? No SSL? Come on guys! At LEAST encrypt the data in flight!

    In reality, they should encrypt it at rest too, and have the user at least submit some sort of password or something so its not just.... gobs of juicy data waiting to be sniffed or scooped. Realistically this means everyone who had one of these phones, with few exceptions, have their data, out of their control, just waiting to be abused.

  • by arth1 ( 260657 ) on Tuesday July 02, 2013 @02:28PM (#44168673) Homepage Journal

    These are not the droids you are looking for... Look at the Chinese! Look at the evil Chinese! They're spying on us!

    Well, of course they are. But look at it this way:

    When the Chinese spy on you, what can they do to you based on the data it gathers?
    When the your own government spies on you, what can it do to you based on the data it gathers?

    Somehow, I feel safer sending my data to the Chinese...

  • by Anonymous Coward on Tuesday July 02, 2013 @02:29PM (#44168699)

    Yes.

  • by ebno-10db ( 1459097 ) on Tuesday July 02, 2013 @03:05PM (#44169155)

    Part of the reality of "security" is taking responsibility for your own.

    The only way to get real security and privacy with a cell phone is not to have one. A bonus is that implementation of that strategy requires no special technical knowledge.

  • by AdamWill ( 604569 ) on Tuesday July 02, 2013 @03:12PM (#44169239) Homepage

    You could try reading the article.

    It does appear to be part of Blur, yes.

    Only the X2 was not sold as a phone with Blur, it does not have the obvious UI elements. And the author never explicitly signed up for the Blur service or created an account. The phone appears to have silently created a Blur account for him and proceeded to send a bunch of private information to the service, all without his knowledge or consent. How helpful.

  • by BitZtream ( 692029 ) on Tuesday July 02, 2013 @03:13PM (#44169257)

    So you've manually inspected the binaries from cyanogen to confirm that every release they make is 'safe'?

    Instead of blindly trusting your manufacturer, you're blindly trusting a modder.

    Not really sure why you think its different.

  • by jythie ( 914043 ) on Tuesday July 02, 2013 @04:00PM (#44169767)
    The downside of making it easy to turn things off is that people do, and then something goes wrong, and then they complain the recovery did not work, and you point out it was disabled, and they claim they never disabled it, and then they tell all their friends how much your company has screwed them with your buggy device that mysteriously switched off the useful feature they never heard of but got pissed about not being there.

    I agree it should be an option, but I can sympathize with companies not wanting to deal with that expletive. People who do stupid things rarely blame themselves, but they are happy to blame others loudly in public where it can hurt your brand.
  • by gnasher719 ( 869701 ) on Tuesday July 02, 2013 @04:07PM (#44169845)

    You can RELOAD the device's OS with custom ROMs that don't do this crap. If it was discovered Apple does this (and who's to say they don't) what choice have you? And Windows phone? Don't even start.

    So there is a massive _actual_ privacy violation by Google (who owns Motorola and is 100% responsible for anything that happens under the name Motorola), and you complain about what-ifs with Apple and Microsoft?

    Remember that Google's customers are the advertisers. Apple's customers are people buying Apple devices. I expect both Google and Apple to do what is good for their customers, even if it hurts others (like _you_ in the case of Google, and advertisers in the case of Apple).

  • by Anonymous Coward on Tuesday July 02, 2013 @04:48PM (#44170209)

    God damnit, harrar. I'm really not trying to stock your chicken-hating ass, but I go to reply to a dumbass post and it's coincidentally you.

    Even if the data were encrypted, the "proxy monitoring" software mentioned by the person you were replying to would still see encrypted traffic being sent to a specific IP address. You can't encrypt the IP address or the packets wouldn't get routed.

    You're the stupidest and most vocal fucktard on this site. And I"m pretty sure BitzStream is one of your sockpuppet accounts.

    Cluck a doodledo motherfucker.

For large values of one, one equals two, for small values of two.

Working...