ByĀ Bill Budington
Ring isnāt just a product that allows users to surveil their neighbors. The company also uses it to surveil its customers.
An investigation by EFF of the Ring doorbell app for Android found it to be packed with third-party trackers sending out a plethora of customersā personally identifiable information (PII). Four main analytics and marketing companies were discovered to be receiving information such as the names, private IP addresses, mobile network carriers, persistent identifiers, and sensor data on the devices of paying customers.
The danger in sending even small bits of information is that analytics and tracking companies are able toĀ combineĀ these bits together to form a unique picture of the userās device. This cohesive whole represents a fingerprint that follows the user as they interact with other apps and use their device, in essence providing trackers the ability to spy on what a user is doing in their digital lives and when they are doing it. All this takes place without meaningful user notification or consent and, in most cases, no way to mitigate the damage done. Even when this information is not misused and employed for precisely its stated purpose (in most cases marketing), this can lead to a whole host ofĀ social ills.
Ring has exhibited a pattern of behavior that attempts toĀ mitigate exposureĀ to criticism and scrutiny while benefiting from the wide array of customer data available to them. It has been able to do so by leveraging an image of the secure home, while profiting from a surveillance network which facilitates police departmentsā unprecedented access into the private lives of citizens,Ā as we have previously covered. For consumers, this image has cultivated a sense of trust in Ring that should be shaken by the reality of how the app functions: not only does Ring mismanage consumer data, but it also intentionally hands over that data to trackers and data miners.
Findings
Our testing, usingĀ Ring for AndroidĀ version 3.21.1, revealed PII delivery toĀ branch.io
,Ā mixpanel.com
,Ā appsflyer.com
Ā andĀ facebook.com
. Facebook, via itsĀ Graph API, is alerted when the app is opened and upon device actions such as app deactivation after screen lock due to inactivity. Information delivered to Facebook (even if you donāt have a Facebook account) includes time zone, device model, language preferences, screen resolution, and a unique identifier (anon_id
), which persists even when you reset the OS-level advertiser ID.
Branch, which describes itself as a ādeep linkingā platform, receives a number of unique identifiers (device_fingerprint_id
,Ā hardware_id
,Ā identity_id
) as well as your deviceās local IP address, model, screen resolution, and DPI.
AppsFlyer, a big data company focused on the mobile platform, is given a wide array of information upon app launch as well as certain user actions, such as interacting with the āNeighborsā section of the app. This information includes your mobile carrier, when Ring was installed and first launched, a number of unique identifiers, the app you installed from, and whether AppsFlyer tracking came preinstalled on the device. This last bit of information is presumably to determine whether AppsFlyer tracking was included as bloatware on a low-end Android device. Manufacturers often offset the costs of device production by selling consumer data, a practice that disproportionately affects low-income earners and was the subject of a recentĀ petition to GoogleĀ initiated by Privacy International and co-signed by EFF.
Most alarmingly, AppsFlyer also receives the sensors installed on your device (on our test device, this included the magnetometer, gyroscope, and accelerometer) and current calibration settings.
Ring givesĀ MixPanelĀ the most information by far. Usersā full names, email addresses, device information such as OS version and model, whether bluetooth is enabled, and app settings such as the number of locations a user has Ring devices installed in, are all collected and reported to MixPanel. MixPanel is briefly mentioned in RingāsĀ list of third party services, but the extent of their data collection is not. None of the other trackers listed in this post are mentioned at all on this page.
Ring also sends information to the Google-owned crash logging serviceĀ Crashalytics. The exact extent of data sharing with this service is yet to be determined.
Methodology
All traffic we observed on the app was being sent using encrypted HTTPS. Whatās more, the encrypted information was delivered in a way that eludes analysis, making it more difficult (but not impossible) for security researchers to learn of and report these serious privacy breaches.
Our dynamic analysis was performed usingĀ mitmproxy
Ā running on an access point to intercept and analyze HTTPS flows from an Android test device. To remove noise generated from other apps, we installed the AFWall+ firewall app and only allowed network traffic from Ring.Ā mitmproxy
Ā generates a root x509 certificate which is to be installed in the OS-level certificate store in Android, allowing active interception to take place on otherwise secured traffic. This led us to the initial discovery that the root certificate was not being accepted as valid, and that some form of certificate pinning was being employed by the app.
App-level certificate pinning is when an app validates the certificates of a remote server against a record of that certificate stored within the app, rather than validating against the list of root certificates within the OS. This is often used as a security measure, to ensure thatĀ misissuanceĀ of certificates or mismanagement along the chain of trust in PKI does not compromise the integrity, confidentiality, or authenticity of HTTPS traffic. Unfortunately, it canĀ also prevent security researchers and users from seeing exactly what information these devices are sending, and to whom. In the case of Ring, we initially observed all intercepted traffic upon launch being rejected, and were not able to observe any communications.
It was only through the powerful dynamic analysis frameworkĀ FridaĀ that we were able to inject code into Ring at runtime, which ensured that the certificate provided by ourĀ mitmproxy
Ā instance would be accepted as valid. This allowed us to inspect all HTTPS traffic sent through the app.
Conclusion
Ring claims to prioritize the security and privacy of its customers, yet time and again weāve seen these claims not only fall short, but harm the customers and community members who engage with Ringās surveillance system. In the past, weāve illuminated the mismanagementĀ of user information which has led to data breaches, and the attempt to place the blame for such blunders at the customersā feet.
This goes a step beyond that, by simply delivering sensitive data to third parties not accountable to Ring or bound by the trust placed in the customer-vendor relationship. As weāve mentioned, this includes information about your device and carrier, unique identifiers that allow these companies to track you across apps, real-time interaction data with the app, and information about your home network. In the case of MixPanel, it even includes your name and email address. This data is given to parties either only mentioned briefly, buried on an internal page users are unlikely to ever see, or not listed at all.
mitmproxy
Ā flow files:
Article source:Ā EFF.org