Never heard of that before. Source?
It can be done. It was something that came up a while ago. They use some tricks to do it and generally speaking those few apps get caught pretty quickly by the xda guys and in turn Google tends tends to pull them.
This whole fisaco is why I like to see a list of permissions before installing an app, ala WP7/Android.
Flashlight app wants full internet access, location and contacts? No install for you!
Example:
Image
Never heard of that before. Source?
The problem mostly lies within code added by the handset manufacturer, as shown by the chart on the 2nd link. ASOP is significantly safer/compliant than HTC Sense. So there appears to be little Google can do about it, outside of redesigning their permissions system.Has it been fixed in recent versions of Android?
I recall reading that before. Here's a few of them:
http://www.androidpolice.com/2011/1...e-numbers-gps-sms-emails-addresses-much-more/
http://www.securitycurve.com/wordpress/archives/4925
Whether they're fixed or not, I have no idea. Given the explanation as to how some of those leaks work versus how long those manufacturers take to get OS updates out, I'm strongly leaning on the "not likely to have been fixed yet" side.
The problem mostly lies within code added by the handset manufacturer, as shown by the chart on the 2nd link. ASOP is significantly safer/compliant than HTC Sense. So there appears to be little Google can do about it, outside of redesigning their permissions system.
Wow, that's quite bad of HTC. Even without the permissions problem, what's with all the backdoors anyway?
This is why I use custom ROMs - I want to remove all that crap off my phone, even if I do use HTC Sense I don't want security issues arising from it.
My guess is that HTC was simply in a hurry and their engineers did not have time to understand the permissions system. I haven't delved into it, but I suspect that it's not as simple to understand as people commonly think. Besides, official Android docs are pretty crappy to begin with.
I trust custom Android ROMs as much as I trust an unaudited jailbroken iPhone. That is to say, not at all.
Custom ROMs are open sourced and if they started spying on people, one of the many tech savvy people on XDA would notice and call the developer up on it. It's not hard to check the packets going in and out of a phone with a full set of Linux tools on it.
HTC shouldn't be putting spyware on their ROMs in the first place. I suspect this stuff still exists in their phones today even if the permissions issue is fixed. It's quite worrying really.
Of course, being called out on it happens way after the ROM has made it way around the world. Not all ROMs provide full sources or change lists either.
Check this case out. We know it's been found and fixed. But that doesn't make the backdoor any less scary. What if somebody installed this ROM on a friend's phone?
http://www.droidforums.net/forum/li...-their-phone-taken-control-liberty-1-5-a.html
I do agree that it's not cool to have blatant spyware on your production ROM. But at the same time, some of what this stuff does has legit uses. Although could have been better implemented. The difference between diagnostic logging and spyware is pretty small. And mostly in the "raw user data" to "anonymized statistical data" ratio. (I'm fine with a daemon reporting that my address book has 300-400 entries, with an average of 1.5 addresses per entry, and 12 groups. I'm not fine with them sending the actual entries or even exact count of entries.)
HTC also included another app called HtcLoggers.apk. This app is capable of collecting all kinds of data, as I mentioned above, and then... provide it to anyone who asks for it by opening a local port. Yup, not just HTC, but anyone who connects to it, which happens to be any app with the INTERNET permission. Ironically, because a given app has the INTERNET permission, it can also send all the data off to a remote server, killing 2 birds with one stone permission.
That isn't a backdoor, it's just a script which does silly things to the phone. A backdoor allows external access, that was just the case of a ROM coming with a test script and people thinking their phones were being hacked as a result.
Even if a ROM doesn't provide a source, finding spyware that sends out data from your phone isn't difficult. Like I said, you can just watch the packets going out the phone if you want, and with however many millions of members - many of whom are hackers - on xda and other Android sites, I'm sure at least one would pick it up even if it was being more discreet than the example you provided.
That script was built into the ROM and checked a server for stuff to run on reboot. It allows an external party (the ROM creator) to arbitrarily execute a script on all user's phones without directly interacting with them. I'm pretty sure that qualifies as backdoor or a botnet built right into the custom rom.
Here's the thing, while you're right that you can watch the packets going out from the phone.... really, how many people do this? I certainly don't have the time for this unless I'm debugging my own apps. And this assumes spyware doesn't use encryption. As much as I appreciate the few security specialists who do survey their traffic, I'm certainly not expecting that any other cell phone hacker is going to do this to "keep us safe" because a phone hacker who knows what he's doing usually knows that there's plenty of cool stuff he could be making instead of staring into the matrix looking for that one misplaced packet.
With that said, I also don't trust HTC phones either. My Nexus S runs ASOP "as Google intended it to be" and my iPhone4 is not jailbroken. If something's screwed up, I know who to blame.
As for the HTC port thing, it's probably filtered at the kernel level to localhost only. It'll only be remotely exploitable if a relay app is installed or if a linux tcp stack exploit is found. The latter would make it into the news for linux web servers before Android fans hear of it, if it ever happens.