A new investigation from TechCrunch today reveals that some iPhone apps are using services like Glassbox, a “customer experience analytics firm” to track the taps and swipes you make. Apps such as Hollister, Air Canada, Expedia, and Hotels.com are using this framework, and in some cases they inadvertently reveal sensitive information.
Sylvania HomeKit Light Strip
Glassbox is one of the so-called analytics firms that employ “session replay technology.” This allows developers to record displays and review how users interacted with their app. “Every tap, button push, and keyboard entry is recorded,” TechCrunch says.
These session replays let app developers record the screen and play them back to see how its users interacted with the app to figure out if something didn’t work or if there was an error. Every tap, button push and keyboard entry is recorded — effectively screenshotted — and sent back to the app developers.
In a recent tweet, Glassbox said: “Imagine if your website or mobile app could see exactly what your customers do in real time, and why they did it?”
Further, The App Analyst recently discovered that the Air Canada iPhone app doesn’t properly mask session replays. This means sensitive information like passport numbers and credit card information is easily viewable to Air Canada employees. While this isn’t the case for all of the apps, Air Canada recently suffered a data breach affecting 20,000 user profiles, which doesn’t bode well for its security practices.
In some cases, apps send session replay data directly back to Glassbox servers, while some companies send it back to their own servers. In both cases, some data was found unmasked and easily accessible with man-in-the-middle tools:
The App Analyst said that while Hollister and Abercrombie & Fitch sent their session replays to Glassbox, others like Expedia and Hotels.com opted to capture and send session replay data back to a server on their own domain. He said that the data was “mostly obfuscated,” but did see in some cases email addresses and postal codes. The researcher said Singapore Airlines also collected session replay data but sent it back to Glassbox’s cloud.
Use of screen recording analytics frameworks on iOS isn’t necessarily a new thing. Developers who use them can only see within their apps, not the entire operating system. Apple has yet to crackdown on the use of such frameworks, but we wouldn’t be surprised if that happened soon.
The full investigation from TechCrunch can be read here.