Android and iOS Devices Impacted By New Sensor Calibration Attack (zdnet.com) 59
A new device fingerprinting technique can track Android and iOS devices across the Internet by using factory-set sensor calibration details that any app or website can obtain without special permissions. From a report: This new technique -- called a calibration fingerprinting attack, or SensorID -- works by using calibration details from gyroscope and magnetometer sensors on iOS; and calibration details from accelerometer, gyroscope, and magnetometer sensors on Android devices. According to a team of academics from the University of Cambridge in the UK, SensorID impacts iOS devices more than Android smartphones. The reason is that Apple likes to calibrate iPhone and iPad sensors on its factory line, a process that only a few Android vendors are using to improve the accuracy of their smartphones' sensors. "Our approach works by carefully analysing the data from sensors which are accessible without any special permissions to both websites and apps," the research team said in a research paper published yesterday. "Our analysis infers the per-device factory calibration data which manufacturers embed into the firmware of the smartphone to compensate for systematic manufacturing errors [in their devices' sensors]," researchers said. This calibration data can then be used as a fingerprint, producing a unique identifier that advertising or analytics firms can use to track a user as they navigate across the internet.
Re: (Score:1)
Well, if it's not accessible at all, there's no point in the phone even having it. But I agree that at the very least you should have to give an app permissions to read this data. And those apps should only be from carefully licensed, trustworthy vendors. Making it accessible to arbitrary web pages is as stupid as the battery meter blunder.
Re: (Score:1)
If you want a sharp focus on your dick pic, the DickPicWartRemover app is going to need to aim the camera with these sensors. That's why. (not really.)
Rube Goldberg technique for device fingerprinting (Score:2)
Re: (Score:2)
Since this requires installing an app, you could just generate a new ID for each app install.
Very few people will say no to internet access for an app.
Simple workaround (Score:3)
Spock (peering into visor): Sensors indicate that the early 21st-century communicator device belongs to one "William Shatner".
Kirk: Reverse Polarity!
How is this an attack? (Score:2, Insightful)
While this is a way to fingerprint a phone, but heck it is easier by just recording the MAC address of the device. It just seems like an academic study, much like tracking keyboard typing speeds and accuracy to get a good idea on who is using the computer.
Re: (Score:2)
Websites do not have access to the MAC address of the device by default.
Re: (Score:2)
This is about smartphone apps, not websites.
Re: (Score:2)
iOS apps don’t have access to the device’s MAC address.
Apple fixed it already (Score:5, Informative)
Re: (Score:2)
So the fix would appe
Re: (Score:2)
On android, almost everything requires a permission, including these sensors.
"Stay awake when the phone is being moved around" is not a normal mode for Android apps. Instead, it is almost always based on either the screen being on, or the lock screen being active. There are specific permissions for being able to keep the device awake.
Re: (Score:2)
Didn't Chrome already reduce the accuracy of sensor data available to the Web year or two ago?
This seems like the same or nearly identical problem with an existing codepath to deal with it on Chrome. I would guess Orfox already does it though Fennec can be slow to pick up their privacy work.
Calling it an attack is a bit click-baity. (Score:5, Insightful)
Re: (Score:3)
How is this an "attack"? (Score:1)
Sensationalistic title for certain. This is not an attack, it is just a method for tracking users. It would be an attack if they used an exploit to crack the system. Using data that is readily available? That's like suggesting a DNS search is an attack against internet hosts.
Re: (Score:1)
These devices have a unique device ID, and app permissions to control which apps can read it.
It is permission-controlled data.
Leaking side channel data that is supposed to be unrelated, but acts as a proxy for other permission-controlled data, that's clearly an attack.
Like all the other data, if steps hadn't been taken to protect it, then leaking it wouldn't be an attack. But also like all other data, if steps have been taken to protect the data, then something that leaks it without permission is an attack.
Why is the browser making this data available? (Score:2)
And more importantly, why isn't there a checkbox to turn that function off? And why isn't it off by default?
There's absolutely no reason a web page should be able to ask my magnetometer offset. That's not part of turning HTML into pixels.
Is there a list of browsers which do and don't implement this function?