-
-
Notifications
You must be signed in to change notification settings - Fork 358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Google Play Compliance: Precise location supposedly sent off device #3466
Comments
So let's see, what does the app connect to at all?: Not user-related
User-related:
Now, one can argue that the precise/coarse location of the user can be determined by
But I kind of doubt that the Google Play policy bot would detect this because the former does not send the user's location but only the location of the things he answers quests for and the latter are just tile numbers. This doesn't need to be his location, he could be just scrolling the map. So, any idea where the app might elsewhere send off the user's location? |
I think you are over-estimating how smart the policy bot is. After all, how might it work? I can only think of:
Keep in mind that they're probably looking to find bad actors who are looking to skirt the Play Store policies, and that it's fairly easy to obfuscate what data you're exfiltrating. So, I wouldn't be surprised at all if the tool casts an overly broad net (like 1A— "ever triggers", without checking what data it contains). I'd guess that the culprit is |
I have no idea how Google detects it (hey, their AI might be smart enough to read and interpret privacy policy lingo 😱 ) , but I would say that the
Also, the fact that the location is transmited indirectly (via OSM integer element ids which have Thus, I believe that the fact that user location is being sent outside of device needs to be declared in that Data safety form too. |
Overall I think that it is reasonable to describe SC as revealing specific user location.
Downloading map tiles at specific location? Maybe static analysis run also at Tangram library code included in the app? Google pattern matching could also detect GPS track recording, despite that this is not send anywhere.
I would say that app by requesting specific map tiles is sending data that can be used to reconstruct user location, and Jawg would be likely able to reconstruct my location to a high accuracy. Also, as @smichel17 notices quest download also fetches data mostly at user location - and maybe on OSM API side one would be able to distinguish automatic and user-triggered queries. Pattern matching (buzzworded into AI) is likely unable to detect this, but by making edits user is also sending very precise location - that was my point of #3208 One does not need to be a genius analyst to reconstruct where I walked yesterday (with looking at specific elements it would be even worse and more accurate) |
Perhaps this is only:
This is interpreted as: small Location updates are send to someone. |
Right, I think this is how it may work @HolgerJeromin After all, a bad-actor could just encrypt the precise location to circumvent any detection. So I added that the precise location is transmitted since it somehow is, de-facto, not on a technical level and resubmitted the form. |
Google Play introduced a new data safety policy. For app developers, this is basically a form they need to fill out and declare what user data exactly is shared with a third party (sent off the device).
This information will then be shown on the app page on Google Play.
The data types as documented here need to be declared.
I filled out the form and declared the following:
After filling out the form, I got this message:
TLDR: Google Play claims that StreetComplete sends off the precise user's location somewhere which was apparently automatically determined by some AI. Does anyone have any idea what could cause this AI to think that?
The text was updated successfully, but these errors were encountered: