Author : Shruti Ghosh 1
Date of Publication :9th November 2022
Abstract: Applications pay a very important role in our lives today. However, these applications have a huge access to the private information of their users which can pose a serious risk on the privacy of the users. To implement a Man-in-the-Middleproxy to note down the traffic of a network that top 20 free applications generate, a research has been done. This work describes the requirement along with the technical considerations that were used to deploy the monitoring WiFi Networks during the conduction of the experiment. The result of the research depicts how the personal information or data of the application’s user is leaked by several applications during installation of that application.
Reference :
-
- Timothy A. Chadza§, Francisco J. Aparicio-Navarro*, Konstantinos G. Kyriakopoulos†, Jonathon A. Chambers – “A Look Into the Information Your Smartphone Leaks”.