• xep@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      6 months ago

      I know you’re being flippant, but it’s worth noting that there is a considerable difference between a company getting hacked like this and an app with unfettered access to the cluster to sensors that we’ve got in our pockets.

    • kibiz0r@midwest.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      6 months ago

      The ban is a dumb policy, but you’re daft if you think the security implications are at all similar.

      TikTok was caught injecting a keylogger into their in-app browser and their response was “Well yeah, but we promise we’re not using it.”

        • kibiz0r@midwest.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          6 months ago

          No. This is analogous to cross-frame scripting.

          So imagine you go to tiktok.com and you click on a link to bestbuy.com/cool-product-i-want-to-buy. But instead of taking you directly to bestbuy.com/cool-product-i-want-to-buy, it keeps you on tiktok.com and just opens an iframe with a keylogger injected into it.

          So then when you enter credit card info into the bestbuy.com UI, the tiktok.com JS can see what you typed.

          (This scenario is largely impossible these days, due to modern browser security.)

          The difference is that if you witnessed this kind of XFS in your desktop browser, you might notice it because the location bar still says tiktok.com, because you never actually left the site. But in a mobile in-app browser, you don’t need an iframe. You can inject JS directly into the browser itself, making it invisible to the user. As far as you can tell, you’re on regular ol’ bestbuy.com, not a modified version of it.

            • kibiz0r@midwest.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              6 months ago

              lmao, you asked.

              I’m not a security expert, but my tech career has involved a lot of automated testing in weird scenarios, including iframe-based Facebook games and browser-based mobile apps. Automated tests face a lot of the same challenges that a malicious third-party would, so I know a little bit about how to get past them – or rather, how to deliberately create vulnerabilities (in the dev build of your system) so that your tests can get past them.

              Edit: I am curious why someone downvoted me on that one though. I can understand how my comment about the ban being dumb but TikTok also shipping a keylogger could anger people on one side or the other. But just explaining how in-app browsers revive a security problem that’s been long-solved in standalone browsers?

    • Cavemanfreak@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      6 months ago

      The thing with tik tok isn’t only with the data China can gather from US residents. It’s also how they can use that information to influence the populace and send them propaganda, for example influencing the election results.

        • Cavemanfreak@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          6 months ago

          The section Methods on the Cambridge Analytica wiki page explains it pretty well. While it’s not proven to be able to directly influence voting, it’s effective at swaying people’s opinions and emotions about subjects.