![]() Some of that sounds OK, but it's been well established by other researchers that Android ad IDs can be used to physically track individuals geographically. He fired up the LastPass app and watched what the trackers transmitted back to home base.Īccording to him, the MixPanel tracker sent out the device maker, Android version, model number, device ID, LastPass account type and whether the LastPass app had biometric login and autofill enabled.ĪppsFlyer, Kuketz said, sent out most of that plus the name of the cellular network operator, the Android ad ID and a mysterious user ID. Kuketz thinks the LastPass trackers, which even LastPass arguably may not know much about, sent out too much information regardless. Now, as The Register pointed out, LastPass has a lot of free users - though it's set to lose many of them next month due to policy changes - so you might think it's entitled to make at least a little money on them. ![]() "These trackers collect limited aggregated statistical data about how you use LastPass which is used to help us improve and optimize the product." Phoning home with lots of data "No sensitive personally identifiable user data or vault activity could be passed through these trackers," The Register said a LastPass spokesperson replied. The Register (opens in new tab), which earlier reported this story, reached out to LastPass. Werbe- und Analytik-Module haben darin schlichtweg nichts verloren - es ist vollkommen indiskutabel, diese in Passwort-Manager-Apps zu integrieren.") LastPass' statement ![]() (In the original, in case we got something wrong, that's "Für eine App, die äußerst sensible Daten (Passwörter) verarbeitet, ist das schlichtweg ein Armutszeugnis.
0 Comments
Leave a Reply. |