7:17 p.m. | Updated Adding context in fourth paragraph.
Itâ€™s not just Apple. Photos are vulnerable on Android phones, too.
As Bits reported this week, developers who make applications for Apple iOS devices have access to a personâ€™s entire photo library as long as that person allows the app to use location data.
It turns out that Google, maker of the Android mobile operating system, takes it one step further. Android apps do not need permission to get a userâ€™s photos, and as long as an app has the right to go to the Internet, it can copy those photos to a remote server without any notice, according to developers and mobile security experts. It is not clear whether any apps that are available for Android devices are actually doing this.
The Apple and Android problems are a reminder of how hard it can be to ensure security on complex mobile devices that can run a vast array of apps. Android apps are required to alert users when they want to retrieve other kinds of personal data â€” like e-mail, address book contacts or a phoneâ€™s location â€” so the lack of protection for photos came as a surprise to some experts.
â€œWe can confirm that there is no special permission required for an app to read pictures,â€ said Kevin Mahaffey, chief technology officer of Lookout, a company that makes Android security software. â€œThis is based on Lookoutâ€™s findings on all devices weâ€™ve tested.â€
In response to questions, Google acknowledged this and said it would consider changing its approach.
A Google spokesman said that the lack of restrictions on photo access was a design choice related to the way early Android phones stored data. The first Android smartphones could put photos on a removable memory card, which complicated the issue of photo access, he said. For example, a user might grant an app permission to retrieve photos from one card but not want the app to use photos on a card that was in place on another day.
â€œWe originally designed the Android photos file system similar to those of other computing platforms like Windows and Mac OS,â€ the spokesman said in an e-mail message. â€œAt the time, images were stored on a SD card, making it easy for someone to remove the SD card from a phone and put it in a computer to view or transfer those images. As phones and tablets have evolved to rely more on built-in, nonremovable memory, weâ€™re taking another look at this and considering adding a permission for apps to access images. Weâ€™ve always had policies in place to remove any apps on Android Market that improperly access your data.â€
To demonstrate how vulnerable images are on Android devices,Â Ralph Gootee, an Android developer and chief technology officer of the software company Loupe, put together a test application that appears to be a simple timer. Installing the app produces a notification that it wants to be able to access the Internet, but there is no notice about photos. When the app is started and the user sets the timer, the app goes into the photo library, retrieves the most recent image and posts it on a public photo-sharing site.
â€œPhotos if anything are the most personal things,â€ Mr. Gootee said. â€œIâ€™m really kind of shocked about this.â€
Ashkan Soltani, a researcher specializing in privacy and security, said Googleâ€™s explanation of its approach would be â€œsurprising to most users, since theyâ€™d likely be unaware of this arbitrary difference in the phoneâ€™s storage system.â€ Mr. Soltani said that to users, Googleâ€™s permissions system was Â â€akin to buying a car that only had locks on the doors but not the trunk.â€
InÂ the Android Market, Googleâ€™s official Android app store, customers can report suspicious activity in apps so the company can review and potentially remove them. Google also says it has a security system called Bouncer, which puts apps through a simulation to look for things like hidden features that could steal a userâ€™s personal information. Still, the Android Market allows anybody to publish an app, so a malicious one that evaded Googleâ€™s automated screening could end up on many devices.
â€œUsers typically presume some care is given when designing these platforms such that their personal data is handled in a consistent way,â€ Mr. Soltani said. â€œHowever, this seems to repeatedly be a false assumption.â€
Googleâ€™s explanation for the way it handles photo permissions seems to run counter to the companyâ€™s earlier statements about Androidâ€™s handling of user data in general. After Apple, Google and others came to an agreement last week with Californiaâ€™s attorney general on privacy protection within apps, Randall Sarafa, a Google spokesman, talked about Googleâ€™s strict rules on app permissions. â€œFrom the beginning, Android has had an industry-leading permissions system which informs consumers what data an app can access and requires user approval before installation,â€ Mr. Sarafa said.
Googleâ€™s security guide for Android developers says: â€œA central design point of the Android security architecture is that no application, by default, has permission to perform any operations that would adversely impact other applications, the operating system, or the user.â€ It adds that this includes â€œreading or writing the userâ€™s private data.â€
Article source: http://bits.blogs.nytimes.com/2012/03/01/android-photos/