50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system
The Morning Paper
SEPTEMBER 24, 2019
you should definitely check it out if you don’t already know it!). Each app was then executed on a physical mobile phone equipped with a custom OS and network monitor. Network traffic is also monitored, included all TLS-secured traffic where the developers hadn’t used certificate pinning (i.e., most apps). most apps).
Let's personalize your content