Skip to main content

Featured post

Sarahah is Not So Anonymous After All



Sarahah, the popular, anonymous messaging app is doing more than just collecting anonymous messages for users. It’s actually uploading your entire phone book data for no apparent reason.


Sarahah is designed with the purpose to allow people to message its users anonymously which people using the app can access later.  However, according to a study by The Intercept, the application is updating the entire phone book data from the user’s smartphone.
Considering the fact that Sarahah is built upon the anonymity principle, the use of downloading a user’s phonebook data does not have a plausible reason.
Following the report and a video showing the app uploading data, app developer ZainAlabdin Tawfiq came up with a statement that the app will be using this data for a planned feature.
The app, however, does require permission and user consent to upload data from the devices to its servers. But the app uploading data right away and the developer preaching the fact that it will be used in a future version of the app does not really add up, right now.
With its growing popularity, Sarahah likely has a large database of contacts and other personal information. While the developers are claiming that this feature was to be removed before making the application live, there is no information as to what will happen to all the contacts that are already with the app developers.
While it is difficult to control the data that has already been shared through the app. Future users can make use of the app permission function on their smartphones to deny Sarahah any access to their phonebook and its contents.
For those users who want to use Sarahah without the app, they can make use of the web version and get away by sending and receiving messages without having to worry about app permissions.

Comments

Popular posts from this blog

MacPorts Brings the Best Open Source Software to Your Mac

It’s safe to say that the Apple ecosystem brought “app stores” to the mainstream. Before the introduction of the iPhone, buying digital software was often full of trials like submitting your payment to the developer’s website, waiting for a license key by email, and negotiating refunds. You’d be forgiven for thinking that free and open source software (FOSS) is rare on the Mac, given Apple’s approach. In reality, the Mac is an excellent host for many of the community’s best free tools. MacPorts  is your “app store” for all this great software. Let’s take a look at how it works. What Is MacPorts? MacPorts is a package system for Macs. It’s very similar in function and use to the Red Hat Package Management (RPM) system and Advanced Package Tools (APT), which install DEB packages on Linux. Actually, it descends from the Ports system of FreeBSD. Did you know Mac OS X started its life as a fork of FreeBSD called Darwin? Even today macOS has a sol...

Finding the Cheapest Car to Insure When Making a New Car Purchase

other lists of least expensive cars to insure do exist, in comparing the results above to those lists, the top 5 were already in this list, so this is a good guideline for the National Average expectation for cars costing less on insurance. Here are the other cars that made the list of vehicles that will save you money on insurance costs compared to the national average. All these cars cost between $1,204 and $1,221 per year according to the annual ranking of least expensive cars to insure. Mazda CX-3   Honda Pilot LX Fiat 500X Pop Nissan Frontier S Hyundai Tuscon SE Subaru (XV) Crosstrek 2.0l Honda HR-V LX Ford F-150 XL Ford Edge SE What Makes a Car Less Expensive for Insurance The information used to determine the cheapest cars to insure can often also be a good indicator to you of the cheapest cars to maintain and service. It can also be an indicator of potential problem areas because the insurance rates are determined when the insurance company...

Meltdown and Spectre: what you need to know

Overview If you’ve been keeping up with computer news over the last few days, you might have heard about Meltdown and Spectre, and you might be wondering what they are and what they can do. Basically, Meltdown and Spectre are the names for multiple new vulnerabilities discovered and reported for numerous processors. Meltdown is a vulnerability for Intel processors while Spectre can be used to attack nearly all processor types. The potential danger of an attack using these vulnerabilities includes being able to read “secured” memory belonging to a process. This can do things like reveal personally identifiable information, banking information, and of course usernames and passwords. For Meltdown, an actual malicious process needs to be running on the system to interact, while Spectre can be launched from the browser using a script. Microsoft, Google, Mozilla, and other vendors have been releasing patches all day to help protect users from this vulnerability. Some of th...