{"id":28410,"date":"2020-03-17T16:52:41","date_gmt":"2020-03-17T20:52:41","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=28410"},"modified":"2020-03-17T16:52:41","modified_gmt":"2020-03-17T20:52:41","slug":"ios-apps-snooping-on-pasteboard-data","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2020\/03\/17\/ios-apps-snooping-on-pasteboard-data\/","title":{"rendered":"iOS Apps Snooping on Pasteboard Data"},"content":{"rendered":"<p><a href=\"https:\/\/www.mysk.blog\/2020\/03\/10\/popular-iphone-and-ipad-apps-snooping-on-the-pasteboard\/\">Talal Haj Bakry&nbsp;and&nbsp;Tommy Mysk<\/a> (via <a href=\"https:\/\/www.macrumors.com\/2020\/03\/15\/ios-apps-pasteboard-data-report\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.mysk.blog\/2020\/03\/10\/popular-iphone-and-ipad-apps-snooping-on-the-pasteboard\/\">\n<p>This article provides an investigation of some popular apps that frequently access the pasteboard without user consent. These apps range from popular games and social networking apps, to news apps of major news organizations. We found that many apps quietly read any text found in the pasteboard every time the app is opened. Text left in the pasteboard could be as simple as a shopping list, or could be something more sensitive: passwords, account numbers, etc.<\/p>\n<p>[&#8230;]<\/p>\n<p>The method is simple: Once we connect and pair the devices with Xcode, we can read the system log of the device. Fortunately, all pasteboard events are clearly logged.<\/p>\n<p>[&#8230;]<\/p>\n<p>We include any app that requests and reads the content of the system-wide pasteboard every time it&rsquo;s opened, and consider it to be highly suspicious. There are games and apps that do not provide any UI that deals with text, yet they read the text content of the pasteboard every time they&rsquo;re opened.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/pxlnv.com\/linklog\/pasteboard-snooping\/\">Nick Heer<\/a>:<\/p>\n<blockquote cite=\"https:\/\/pxlnv.com\/linklog\/pasteboard-snooping\/\">\n<p>Most apps do not breach user trust in this manner, so it is surprising to see the breadth of very popular apps that are doing so in this case &mdash; many of which have no practical reason for reading pasteboard data in the first place. It&rsquo;s the kind of thing that makes me wonder if they are all, perhaps, using a shared development framework or analytics bundle.<\/p>\n<p>One way to resolve this may be to require consent from the user before the app can access the pasteboard. That consent can be provided in the form of the user tapping the paste button, upon which point the app is authorized.<\/p>\n<\/blockquote>\n\n<p>Just because I once pasted something into an app doesn&rsquo;t mean I want it to have ongoing access to read the pasteboard. Yet I don&rsquo;t want to be prompted for each and every access, either. This seems like another case where it would be helpful for the system to maintain an audit log of what each app was doing.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/09\/25\/chrome-updater-bug-prevents-macs-from-booting\/\">Chrome Updater Bug Prevents Macs From Booting<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/07\/31\/the-alert-hammer\/\">The Alert Hammer<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Talal Haj Bakry&nbsp;and&nbsp;Tommy Mysk (via MacRumors): This article provides an investigation of some popular apps that frequently access the pasteboard without user consent. These apps range from popular games and social networking apps, to news apps of major news organizations. We found that many apps quietly read any text found in the pasteboard every time [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2020-03-17T20:52:44Z","apple_news_api_id":"e1bf6450-3a8d-4e2d-af6d-c206fb1d526a","apple_news_api_modified_at":"2020-03-17T20:52:44Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/A4b9kUDqNTi2vbcIG-x1Sag","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[31,1667,26,1670,355],"class_list":["post-28410","post","type-post","status-publish","format-standard","hentry","category-technology","tag-ios","tag-ios-13","tag-iosapp","tag-pasteboard","tag-privacy"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=28410"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28410\/revisions"}],"predecessor-version":[{"id":28411,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28410\/revisions\/28411"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=28410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=28410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=28410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}