Categories: iPhoneNews

iPhone push notifications are being abused by some popular apps

Security researcher Tommy Mysk has demonstrated that iPhone push notifications are being used by popular apps to covertly send data about the user, according to MacRumors.

In a new video, he explains how certain iOS apps exploit a feature introduced in iOS 10 designed to allow apps to customize push notifications. This feature, initially intended to enable apps to enrich notifications with additional content or decrypt encrypted messages, has seemingly been repurposed by some developers for more secretive activities. 

According to Mysk’s findings, various popular applications, including TikTok, Facebook, Twitter, LinkedIn, and Bing, are using the short background execution time granted for notification customization to send analytics information.

Here’s some more info from Mysk: This video sheds light on a growing practice among data-hungry apps where they use the background execution time allocated by iOS for the purpose of customizing notifications to send app analytics. Many apps do this. We just picked a few for this demo. 

Apps on iOS don’t run in the background. iOS doesn’t allow apps to run in the background for a variety of reasons, mostly related to privacy and performance. Although iOS allows apps to run a few background tasks, access to background execution time is very restricted. But starting in iOS 10, iOS added a new feature to allow apps to customize push notifications even if they are not running. iOS wakes the app in the background when it receives a notification and allows the app a limited time to customize the notification before it is presented to the user. This includes decrypting an encrypted payload and downloading additional content to enrich the notification. Once the app hands in the customized notification to the system or the background time allocated runs out, the app is terminated.

This feature is now being widely used by data-hungry apps to send analytics during this background time. The analytics include unique signals about the user’s device that allow for fingerprinting and tracking users across different apps developed by different developers. Apple does not allow fingerprinting. To counter fingerprinting, Apple is going to require developers to declare why their apps need access to required reason APIs, or APIs that provide signals commonly used for fingerprinting. 

Dennis Sellers

Dennis Sellers is the editor/publisher of Apple World Today. He’s been an “Apple journalist” since 1995 (starting with the first big Apple news site, MacCentral). He loves to read, run, play sports, and watch movies.

Recent Posts

Apple Store retail employees in New Jersey Vote Against Unionizing

According to Bloomberg, Apple retail employees in New Jersey have voted against unionization, the Communications…

10 hours ago

Workers at Apple’s Towson, Maryland, retail store will go on strike

Workers at Apple’s retail store in Towson, Maryland, have voted in favor of authorizing a…

15 hours ago

Apple: No Major App Developers Accept New Outside Payments

No major app developers have signed up to use outside payment options that Apple introduced…

15 hours ago

Apple reportedly close to an agreement to use OpenAI in its artificial intelligence push

Apple has closed in on an agreement with OpenAI to use the startup’s technology on…

2 days ago

Top Apple-related stories this week (May 6-10)

Here are the top Apple-related articles at Apple World Today for the week of May…

2 days ago

Comparison of Outsourcing Opportunities of Poland and Romania

The fast-paced global economy sees outsourcing as a cornerstone strategy for businesses striving to streamline…

2 days ago