<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Till Kottmann</title>
    <description>The latest articles on DEV Community by Till Kottmann (@deletescape).</description>
    <link>https://dev.to/deletescape</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F36071%2Fd2555a2a-3f32-4ca7-9dd8-6a901cc9d5d5.jpg</url>
      <title>DEV Community: Till Kottmann</title>
      <link>https://dev.to/deletescape</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/deletescape"/>
    <language>en</language>
    <item>
      <title>Debugging in prod: Maximizing user attack surface</title>
      <dc:creator>Till Kottmann</dc:creator>
      <pubDate>Sun, 29 Dec 2019 00:00:00 +0000</pubDate>
      <link>https://dev.to/deletescape/debugging-in-prod-maximizing-user-attack-surface-2iab</link>
      <guid>https://dev.to/deletescape/debugging-in-prod-maximizing-user-attack-surface-2iab</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This is a super quick write-up and probably still full of typos and stylistic errors, which you’re free to point out in the comment section.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;One thing that’s really cool about the Android developer ecosystem, is the massive amount of tools and libraries to simplify and help during development. There is an entire subgenre of various remote debugging tools, with cool tools such as &lt;a href="https://github.com/facebook/stetho"&gt;Stetho&lt;/a&gt; or &lt;a href="https://github.com/palaima/DebugDrawer"&gt;Debug Drawer&lt;/a&gt;. One such tool is &lt;a href="https://github.com/amitshekhariitbhu/Android-Debug-Database"&gt;Android-Debug-Database&lt;/a&gt; from Mindorks, it’s a neat little utility that allows you to view and edit your apps preferences and dbs from a web browser during development.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--gxxiQRgN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debugdb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--gxxiQRgN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debugdb.png" alt="Android Debug Database in action."&gt;&lt;/a&gt;&lt;/p&gt;
Android Debug Database in ac­tion.



&lt;p&gt;The key phrase here is, of course, &lt;strong&gt;in development&lt;/strong&gt; , which makes sense to everyone (and is also explained in the integration guide of the library), right? Well, no. During todays &lt;a href="https://shodan.io/"&gt;Shodan&lt;/a&gt; safari I randomly stumbled into a phone running this, openly available for anyone to play around with (Brazilian ISPs having all ports open per default be thanked). On closer inspection it turns out there are thousands of devices indexed on Shodan running debug db.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KX3YIXSw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debug-db-shodan.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KX3YIXSw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debug-db-shodan.jpg" alt="This is bad."&gt;&lt;/a&gt;&lt;/p&gt;
This is bad.



&lt;p&gt;I took a look at some of these to figure out some notable apps, here are two of them:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://play.google.com/store/apps/details?id=com.cinemark"&gt;Cinemark Brazil&lt;/a&gt; - 1M+ downloads&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://play.google.com/store/apps/details?id=com.mix.wsprivate"&gt;No Last Seen for WhatsApp&lt;/a&gt; - 50K+ downloads (yes, this allows reading all contacts and messages in the db)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yGFFKshU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debugdb-sensitive-example.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yGFFKshU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/debugdb-sensitive-example.png" alt="Some of these apps include logs of sensor and location data."&gt;&lt;/a&gt;&lt;/p&gt;
Some of these apps in­clude logs of sen­sor and lo­ca­tion data.



&lt;p&gt;I downloaded Cinemark to verify this for myself, and I was indeed able to read and edit the app’s db and prefs by opening the app and going to &lt;code&gt;localhost:8080&lt;/code&gt;. This is especially ironic considering the app also uses the &lt;a href="https://risk.lexisnexis.com/products/threatmetrix"&gt;ThreatMetrix sdk&lt;/a&gt;, which is some Enterprise Risk management (read: corporate spyware) sdk which supposedly also prevents cybersecurity threats.&lt;/p&gt;

&lt;p&gt;The damning thing here is that we have to consider that most ISPs won’t allow access to their clients on port 8080 (at least not without UpNp), but this will always work inside networks, thus opening up another huge security threat with public WiFis. This also makes me wonder how many other apps are out there, shipping this to all their users and opening them up for attacks by literally anyone. Another terrible thing is that this library allows &lt;strong&gt;editing&lt;/strong&gt; of the data in the db and the prefs, so the actual possible ways to exploit this outside data exfiltration reach far as well.&lt;/p&gt;

</description>
      <category>android</category>
      <category>mobile</category>
      <category>security</category>
    </item>
    <item>
      <title>A quick look at "ad free" mobile monetization platforms</title>
      <dc:creator>Till Kottmann</dc:creator>
      <pubDate>Mon, 09 Sep 2019 00:00:00 +0000</pubDate>
      <link>https://dev.to/deletescape/a-quick-look-at-ad-free-mobile-monetization-platforms-20ao</link>
      <guid>https://dev.to/deletescape/a-quick-look-at-ad-free-mobile-monetization-platforms-20ao</guid>
      <description>&lt;p&gt;If you’re a mobile developer you’ve most probably received your share of E-Mails from monetization platforms, all of them making at least one incredible claim. Some of them are especially interesting as they claim the ability to monetize your app (and earn up to $$$ per month) without having to use any ads. I hope that most of you will just ignore these E-Mails, but I for once decided to dig a little deeper into the world of “ad free” monetization. It goes without saying that the majority of the Services I’ll be looking at today are shady in some way and you should generally avoid them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kzOIHipQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/luminati-email.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kzOIHipQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/luminati-email.jpg" alt="This sounds pretty promising (until you actually do the math)."&gt;&lt;/a&gt;&lt;/p&gt;
This sounds pretty promising (until you actually do the math).



&lt;h2&gt;
  
  
  Luminati
&lt;/h2&gt;

&lt;p&gt;Luminati is the company operating the popular Proxy VPN service &lt;a href="https://hola.org/"&gt;Hola VPN&lt;/a&gt;, which surprisingly is free. When you look a bit into how Hola works,you’ll soon find out that their VPN actually uses the internet connection from their users to proxy their traffic. As a user of Hola other Hola users access the Internet through your connection, as well as paying customers of Luminati. Their large collection of origin IPs allows easy scraping of websites without having to see any Captchas or being rate limited. The Luminati SDK allows your users to become part of the Luminati network and in return get additional features in your app.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jgfWUaIg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/luminati-how-it-works.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jgfWUaIg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/luminati-how-it-works.png" alt="Well I don't see anything wrong with this?"&gt;&lt;/a&gt;&lt;/p&gt;
Well I don't see anything wrong with this?



&lt;p&gt;&lt;strong&gt;Conclusion: With Luminati you are literally selling your users internet connection.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  MobKnow / MobiBurn
&lt;/h2&gt;

&lt;p&gt;MobKnow and MobiBurn are very similar in that they just straight up tell you they are collecting user data. MobKnow isn’t very specific regarding what the data will be used for, MobiBurn on the other side will boast about how they help building audience data for marketing purposes. On top of that it’s also not very clear how real either of these solutions actually are, none of the partners linked on the MobiBurn site seem to actually use their SDK.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5Mgdqgup--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/mobiburn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5Mgdqgup--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/mobiburn.png" alt="MobiBurn shall not be the solution either!"&gt;&lt;/a&gt;&lt;/p&gt;
MobiBurn shall not be the solution either!



&lt;p&gt;&lt;strong&gt;Conclusion: Do you really wanna directly sell the data of your users? Oh, and risk the chance of these SDKs actually being malware?&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Huq
&lt;/h2&gt;

&lt;p&gt;Huq is similar to MobKnow in that it collects user data and they sell it off to investors, governments and researchers. Huq focuses on geo and behavior data to find out what consumers are doing in the real world. As all of the other providers on this list they talk big about privacy and how much they love it, we all know this is a lie and the only reason it’s there is to comfort themselves and developers thinking about integrating their SDK. Hey, at least they seem to actually exist!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3M0Z8ZdU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/huq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3M0Z8ZdU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/huq.png" alt="It's sellout time baby"&gt;&lt;/a&gt;&lt;/p&gt;
It's sellout time baby



&lt;p&gt;&lt;strong&gt;Conclusion: Hell yes, let’s sell out to make some big data company very rich and governments very happy!&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Tutela
&lt;/h2&gt;

&lt;p&gt;Tutela collects network and device data from around the world to gather data about network coverage and speed out in the world. This data is then used by telecom companies to improve their network service where demand exists. I didn’t expect myself to say this today, but Tutela actually seems relatively okay. I wouldn’t use it personally, but out of the bunch it seems like the least intrusive solution which might actually be used for good.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--p8WeeLjB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/tutela.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--p8WeeLjB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/tutela.png" alt="Obviously the exact same claims as always"&gt;&lt;/a&gt;&lt;/p&gt;
Obviously the exact same claims as always



&lt;p&gt;&lt;strong&gt;Conclusion: Best out of the bunch, I still wouldn’t use it though&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Monetizing your app with (moderate) ads and iap is still the best way to monetize your mobile apps while still considering your users privacy and trust. You’re also not going to get rich using any of these platforms, they all pay relatively low rates and probably earn much more with the data collected. All in all software monetization is often shady as a whole, stay safe and keep your users safe!&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Thanks for the great cover image to &lt;a href="https://github.com/HrX03"&gt;HrX&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>monetization</category>
      <category>mobile</category>
      <category>android</category>
    </item>
    <item>
      <title>PSA: Avoid shady Android launcher apps</title>
      <dc:creator>Till Kottmann</dc:creator>
      <pubDate>Mon, 27 May 2019 00:00:00 +0000</pubDate>
      <link>https://dev.to/deletescape/psa-avoid-shady-android-launcher-apps-1l00</link>
      <guid>https://dev.to/deletescape/psa-avoid-shady-android-launcher-apps-1l00</guid>
      <description>&lt;p&gt;There are a lot of really weird and shady apps on the Play Store, yet they keep getting tons of downloads. That’s actually the only reason they still exist, it’s still incredibly easy to just throw a bunch of keywords in your app descriptions and make a whole lot of revenue. Today we’re going to dig into one of the main categories of these apps, Launchers. It’s usually not hard to tell if one of them isn’t really trustworthy, common red flags are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keyword filled app names like ‘S Launcher - S10/S9/S8 Launcher, S10 theme, cool’ (yes, this app exists)&lt;/li&gt;
&lt;li&gt;Built in theme/wallpaper store as a major selling point&lt;/li&gt;
&lt;li&gt;Live/video/3D wallpapers as a major selling point&lt;/li&gt;
&lt;li&gt;Battery/RAM boosters (these are a red flag regardless of what they come with)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Also look at the reviews, especially those with lower ratings, this kind of publishers tend to have paid positive reviews.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7nI-wYL8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/cool_q_launcher.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7nI-wYL8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/cool_q_launcher.png" alt="Yes, this app is just as shady as it looks, but somehow it has over 100.000 downloads."&gt;&lt;/a&gt;&lt;/p&gt;

Yes, this app is just as shady as it looks, but somehow it has over 100.000 downloads.

&lt;h2&gt;
  
  
  How do they all look the same?
&lt;/h2&gt;

&lt;p&gt;A lot of these apps all come from exactly the same developer group. They have multiple developer accounts to create tons of listings for the same app with minor look changes. This allows them to cover a massive amount of keywords and get millions of installs while staying mostly under the radar. Every now and then Google’s algorithm will bless one of them by featuring them on the Play Store homescreen for some users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XKwss2VI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/model_x_launcher.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XKwss2VI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/model_x_launcher.png" alt="It's almost as if this was the same app (it is)."&gt;&lt;/a&gt;&lt;/p&gt;

It's almost as if this was the same app (it is).

&lt;h2&gt;
  
  
  Why do these apps exist?
&lt;/h2&gt;

&lt;p&gt;The first and foremost reason these work at all is because there are people that download them. Not everyone understands technology or apps well enough, to realize which apps are safe to use and which are not. It’s definitely not a bad idea to check the installed apps on the phones of your less tech savy relatives and friends (only with their consent of course), to make sure they haven’t fallen for any of these.&lt;/p&gt;

&lt;p&gt;Almost all of these apps contain ads, usually from multiple SDKs, which generates not insignificant revenue through all the installs they get over all listings. A lot of them additionally upload analytics and other userdata to their own servers, which makes it quite likely they’re additionally selling this or using it for research.&lt;/p&gt;

&lt;p&gt;Recently some of them have even gone as far as to start offering their prime offering not as an overpriced one time payment, but as a monthly subscription.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FDnfeud4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/yikes_thats_expensive.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FDnfeud4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://deletescape.ch/assets/images/yikes_thats_expensive.jpg" alt="The 'Model X Launcher' premium offering is a bargain at only $36/year."&gt;&lt;/a&gt;&lt;/p&gt;

The 'Model X Launcher' premium offering is a bargain at only $36/year.

&lt;h2&gt;
  
  
  Who makes these?
&lt;/h2&gt;

&lt;p&gt;I have no idea who has this little moral integrity to do something like this, but one of the developers I could trace most of the apps in this recent wave of launchers back to is &lt;a href="http://www.900m.net/"&gt;KK Mobile&lt;/a&gt;. Their website is also part of the APIs these apps are using, which are obviously all based on completely unencrypted HTTP. Other API calls (also HTTP) mostly happen directly to these two IPs: &lt;a href="https://www.shodan.io/host/121.40.46.187"&gt;121.40.46.187&lt;/a&gt;, &lt;a href="https://www.shodan.io/host/47.74.185.216"&gt;47.74.185.216&lt;/a&gt;. A quick look on shodan is enough to know that these haven’t been patched in ages and are vulnerable to a whole list of CVEs. So to repeat this again, avoid this kind of launchers (or any other app category obviously) at all cost, there are always better alternatives available.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This post is based on this &lt;a href="https://twitter.com/deletescape/status/1133008200205250560"&gt;twitter thread&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>android</category>
      <category>reverseengineering</category>
    </item>
    <item>
      <title>Why do people still trust Cheetah Mobile in 2018?</title>
      <dc:creator>Till Kottmann</dc:creator>
      <pubDate>Mon, 26 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://dev.to/deletescape/why-do-people-still-trust-cheetah-mobile-in-2018-337j</link>
      <guid>https://dev.to/deletescape/why-do-people-still-trust-cheetah-mobile-in-2018-337j</guid>
      <description>&lt;p&gt;It’s pretty safe to assume that almost everyone has used a Cheetah Mobile app before, prime examples include Clean Master or CM Launcher 3D. Even if you have never heard of them, dozens of other apps and games like TikTok (formerly &lt;a href="http://musical.ly/" rel="noopener noreferrer"&gt;Musical.ly&lt;/a&gt;) are at least indirectly connected to, funded or owned by Cheetah Mobile. After all, they’re the 4th largest publisher on Google Play Store and the Apple App Store after Google, Facebook and Apple. We’ll get to that later. If you are still using any of their apps, it’s time to stop doing so right now. Let me tell you why.&lt;/p&gt;

&lt;h3&gt;
  
  
  A huge web of trash
&lt;/h3&gt;

&lt;p&gt;First of all, let’s clear something up. Cheetah Mobile isn’t an Android app company, they are an AI/big data company and on their LinkedIn company page they even dream about robots and changing the future.&lt;/p&gt;

&lt;p&gt;“So why do they make utility apps in the first place?”, you might ask. The answer to that is quite simple. They want your data and they happen to have found a weak spot. For some reason a lot of Android users download boosters, launchers, and battery savers without thinking twice, assuming that it is normal for these kinds of apps to request every permission Android offers. Speed booster apps really weren’t even a thing before Clean Master came around, and nowadays the Play Store is literally plagued by them. If you take a closer look at them and the names behind them you will soon find yourself entangled in a web of tiny companies which all received mysterious funding from Cheetah Mobile (or other shady companies like DU Apps). If you go a step further and actually take the apps apart you’ll find libraries provided by Cheetah Mobile pretty much every time.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdeletescape.ch%2Fassets%2Fimages%2Fboost_master.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdeletescape.ch%2Fassets%2Fimages%2Fboost_master.png" alt="Let’s take a look at Boost Master for an example, at the right you can see the privacy policy linked in the listing and inside the app"&gt;&lt;/a&gt;&lt;/p&gt;
Let’s take a look at Boost Master for an example, at the right you can see the privacy policy linked in the listing and inside the app



&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F3114%2F1%2ACn2RCc3U-uI_rC6zX8koBQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F3114%2F1%2ACn2RCc3U-uI_rC6zX8koBQ.png" alt="A quick look on whois.com and crunchbase reveals that the domain is owned by Kika Tech, an “AI” company funded directly by Cheetah Mobile"&gt;&lt;/a&gt;&lt;/p&gt;
A quick look on whois.com and crunchbase reveals that the domain is owned by Kika Tech, an “AI” company funded directly by Cheetah Mobile



&lt;p&gt;I could now spend hours explaining why cleaner/booster apps are bad and you shouldn’t use them, but that’s a topic for another post and has also been covered before.&lt;/p&gt;

&lt;h3&gt;
  
  
  Cheetah Mobile sells your data and it’s not even a secret
&lt;/h3&gt;

&lt;p&gt;“But guys, you still haven’t shown any proof that they are selling our data!” Cheetah Mobile’s official website should be good enough proof, right? Well, that’s exactly what I can provide.’&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F0%2AddkL8gdyCcbq5O79" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F0%2AddkL8gdyCcbq5O79" alt="This official Cheetah Mobile website (https://data.cmcm.com) should probably be proof enough, right?"&gt;&lt;/a&gt;&lt;/p&gt;
This official Cheetah Mobile website (https://data.cmcm.com) should probably be proof enough, right?



&lt;p&gt;I first discovered &lt;a href="http://data.cmcm.com/" rel="noopener noreferrer"&gt;Cheetah Data&lt;/a&gt; a few months ago, and while I wasn’t really surprised by it’s existence, it still was amazing to see how big of a deal this really is. I obviously had to go ahead and register for a limited, free account to check out what kind of data they actually collect. And boy, do they collect a lot! If you are a developer yourself you probably know Google Analytics and the kind of statistics it provides you with. Imagine this, but for all applications, including your competition. Updated every two days.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2104%2F0%2Ai_qKtDf3YpkiaTqz" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2104%2F0%2Ai_qKtDf3YpkiaTqz" alt="Cheetah Data essentially allows paying users to get full analytics and profiles of the users of any app"&gt;&lt;/a&gt;&lt;/p&gt;
Cheetah Data essentially allows paying users to get full analytics and profiles of the users of any app



&lt;p&gt;Yes. Cheetah Mobile apps not only collect statistics while you’re using them, they also analyse which apps you use, at what time, and for how long. The fact that all of this data is being sold openly makes me suspect that this is just the tip of the iceberg.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2A-ZkTs5waePagqI4X-wGy6g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2A-ZkTs5waePagqI4X-wGy6g.png" alt="They aren’t even ashamed to tell us how they get their data"&gt;&lt;/a&gt;&lt;/p&gt;
They aren’t even ashamed to tell us how they get their data



&lt;h3&gt;
  
  
  When I say Samsung and Microsoft are sellouts, I mean it
&lt;/h3&gt;

&lt;p&gt;You might be wondering what this has to do with this post right here and you are right to ask so. Samsung’s Android software happens to have a storage cleaning tool, which you might consider a nice to have feature at first… until you look at it a little closer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2A_UAl_RkrCk0yQmDvc58h2g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2A_UAl_RkrCk0yQmDvc58h2g.png" alt="That’s interesting, to say the least"&gt;&lt;/a&gt;&lt;/p&gt;
That’s interesting, to say the least (source: &lt;a href="https://www.reddit.com/r/Android/comments/68rtn1/clean_master_is_what_samsung_uses_for_their/" rel="noopener noreferrer"&gt;Reddit&lt;/a&gt;&lt;a&gt;)&lt;/a&gt;



&lt;p&gt;Clean Master, just like many apps, happens to be developed by Cheetah Mobile. The app on the Google Play Store has over 1,000,000,000 downloads and this number keeps rising. For every person that downloads them, Cheetah Mobile gets more and more data from users. It may be a risky bet, but I’m pretty convinced that almost everyone who uses an Android phone has at some point used an app that is at least indirectly connected to them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2880%2F1%2ASGEedHfuL8X87_ltOoljUg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2880%2F1%2ASGEedHfuL8X87_ltOoljUg.png" alt="Why would more than a billion people downloads this…"&gt;&lt;/a&gt;&lt;/p&gt;
Why would more than a billion people downloads this…



&lt;p&gt;Oh, and if you ever happen to be wanting to install &lt;a href="https://play.google.com/store/apps/details?id=com.cleanmaster.mguard&amp;amp;hl=en_US" rel="noopener noreferrer"&gt;Clean Master&lt;/a&gt; on your Samsung Galaxy but don’t know how to do so, there is no need for you to worry. Samsung has you covered with an official guide on how to install said app.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2560%2F1%2A0vF6skPfxhwYjrt_qcPhOw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2560%2F1%2A0vF6skPfxhwYjrt_qcPhOw.png" alt="I am not really sure if this guide is really helping anyone at all"&gt;&lt;/a&gt;&lt;/p&gt;
I am not really sure if this guide is really helping anyone at all



&lt;p&gt;Now, what does Microsoft have to do with all this? To show you this we’ll need to take a closer look at the Play Store description of CM Launcher 3D to uncover this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AEtD9o5u5tdherfAyFqzbzA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AEtD9o5u5tdherfAyFqzbzA.png" alt="Wait… They actually did that?"&gt;&lt;/a&gt;&lt;/p&gt;
Wait… They actually did that?



&lt;h2&gt;
  
  
  Oh, by the way
&lt;/h2&gt;

&lt;p&gt;Even if you have never used any shady utility apps before you’ve most probably downloaded at least one of the viral games of the past years like Piano Tiles, chances are that game has been created by Cheetah Games or another company magically funded by CM. Other apps and companies Cheetah Mobile owns you might not have realized include TikTok (formerly Musically) and &lt;a href="http://live.me/" rel="noopener noreferrer"&gt;Live.me&lt;/a&gt;, a live-streaming service.&lt;/p&gt;

&lt;p&gt;&lt;a href="http://musical.ly/" rel="noopener noreferrer"&gt;Musical.ly&lt;/a&gt; and Cheetah Mobile merged last year. Social networks are known for pulling every little piece of data from their users. After this merger, Cheetah Mobile developed their own app, TikTok. &lt;a href="http://musical.ly/" rel="noopener noreferrer"&gt;Musical.ly&lt;/a&gt; happened to be shut down and switched over to TikTok. &lt;a href="http://musical.ly/" rel="noopener noreferrer"&gt;Musical.ly&lt;/a&gt; even shut down their live streaming service &lt;a href="http://live.ly/" rel="noopener noreferrer"&gt;live.ly&lt;/a&gt; and encouraged users to switch over to Cheetah Mobile’s LiveMe.&lt;/p&gt;

&lt;p&gt;At this point it should be clear that they do everything in their power to collect data in every field out there, so it would only make sense to also have a browser on the app palette, wouldn’t it? Presenting you “CM Browser”, made to send your juicy browser history and usage data over to your new favorite multimillion-dollar company, ready to be shared with God and the world.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AwqYt1RPaNQw_OTkQj0X92Q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AwqYt1RPaNQw_OTkQj0X92Q.png" alt="And of course they label it as a secure browser, with your privacy in mind (duh)"&gt;&lt;/a&gt;&lt;/p&gt;
And of course they label it as a secure browser, with your privacy in mind (duh)



&lt;h2&gt;
  
  
  TL;DR:
&lt;/h2&gt;

&lt;p&gt;CM solely makes apps to mine data. They sell that data. There is basically nothing they are not collecting. If you have one of their apps installed, anyone can go ahead and analyze how you are using your device and what you’re doing with it. You become part of a big data pool.&lt;/p&gt;

&lt;p&gt;If any of your friends are using Cheetah Mobile software make sure to tell them about this and link them here. You’re also free to quote this post if you are reporting about this issue as well. If you have found other scummy apps/developers or just want to know if an app you are using is tracking you, &lt;a href="https://twitter.com/deletescape" rel="noopener noreferrer"&gt;contact me on Twitter&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I’d also like to thank &lt;a href="https://twitter.com/chris_kardas/" rel="noopener noreferrer"&gt;Christopher Kardas&lt;/a&gt;, co-founder of &lt;a href="https://melonpancakes.xyz/" rel="noopener noreferrer"&gt;Melon Pancakes&lt;/a&gt; (the publication this article got published in) who wrote this story together with me as well as and &lt;a href="https://twitter.com/mweinbachxda" rel="noopener noreferrer"&gt;Max Weinbach&lt;/a&gt; for their feedback and input during the writing of this post. They were a big help when it came to publishing, unveiling and spreading this story!&lt;/p&gt;

</description>
      <category>android</category>
      <category>research</category>
      <category>cheetahmobile</category>
    </item>
  </channel>
</rss>
