iPhone Apps Found Circumventing Apple’s Privacy Rules to Collect User Data

January 25, 2024 In a startling revelation, security researchers at Mysk Inc. have uncovered that several popular iPhone applications, including giants like Facebook, LinkedIn, TikTok, and Twitter, are skirting Apple’s stringent privacy regulations to clandestinely collect user data. This discovery is particularly concerning as it involves these apps gathering information through notifications, a method that remains active even when users close the apps to prevent background data collection.

The researchers were taken aback to find that simply dismissing a notification could trigger the transmission of detailed device information to remote servers. This practice is not an isolated occurrence but a widespread phenomenon within the iPhone app ecosystem. In response to these findings, Meta (Facebook’s parent company) and LinkedIn have refuted claims of using the data for advertising or other inappropriate purposes. LinkedIn insists that the data collection is solely to ensure the proper functioning of notifications and is in line with Apple’s guidelines.

This situation brings to light the issue of “fingerprinting,” a technique employed to identify users by amalgamating various device details, a practice explicitly prohibited by Apple. The type of data being collected includes IP addresses and phone memory space, among others, which can be pieced together to accurately identify individuals.

Interestingly, companies like Google, through apps such as Gmail and YouTube, have been observed to collect only data that is directly relevant to processing notifications. This contrast suggests that the extensive data collection practices of other apps might be driven by motives beyond the stated purposes.

The impending updates to iPhone’s operating system rules, which will demand developers to justify their use of certain APIs, might offer some improvement in this area. However, the effectiveness of these changes hinges on Apple’s enforcement of these rules.

This incident underscores the ongoing struggle in safeguarding digital privacy and the intricate challenges involved in regulating user data collection in the rapidly evolving technological landscape.

[End of Article]

Top Stories

Related Articles

January 15, 2026 Chinese customs authorities have effectively barred Nvidia’s H200 artificial intelligence chips from entering the country, according to more...

January 15, 2026 A new survey suggests much of the promised productivity is being quietly clawed back. While 92 per more...

January 15, 2026 For months, the U.S. Supreme Court poured extraordinary effort into finding the source of the leaked draft more...

January 14, 2026 Anthropic says that more than 90 per cent of the software powering new versions of Claude is more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn