Can the work profile have access to my browsing history, device files, etc.? - General Questions and Answers

I was recently admitted to a company, and as an ease of accessing my e-mails and work schedule, the android "work profile" was made available so that I could have access to company information (such as e-mails, calendar, information and others) without having to receive a corporate cell phone.
However, my biggest concern is with the organization's access to my data. My organization that created the work profile, can have access to my browsing history, data on the device (such as photos, application files, etc.), time I spend using my cell phone, contacts, call logs, and other data personal profile?
I have already visited the google instructions page, but I was still unsure because my organization installed some network certificates and the warning "Your organization can monitor network traffic ..."
Another question:
If I leave a work profile app open in the background, and use my personal profile at the same time, can my organization have access to network traffic and consequently my personal information?
All questions, however redundant, are intended to clarify the details of the organization's access to my personal information
From now on, I am immensely grateful for the help and time you spent reading my questions.

You are holding a phone in your hands for which an organization has concluded a data plan contract and is paying for it. They therefore will have a legitimate interest in the network traffic on this device, unless it is a contract for unlimted bandwidth. Network traffic is triggered by apps / services , which can actually be read out: they simply have to install a HTTP/S proxy what is intercepting the HTTP/S traffic on any app housed on the phone.

jwoegerbauer said:
You are holding a phone in your hands for which an organization has concluded a data plan contract and is paying for it. They therefore will have a legitimate interest in the network traffic on this device, unless it is a contract for unlimted bandwidth. Network traffic is triggered by apps / services , which can actually be read out: they simply have to install a HTTP/S proxy what is intercepting the HTTP/S traffic on any app housed on the phone.
Click to expand...
Click to collapse
The phone is mine, and there is no plan
of internet hired by the company.
It's my personal cell phone, and for me to get
view emails and talk to people from
within the organization, I had to enable
the "work profile".
So I had my personal and work profile
on my personal device.
My question is: my company can see
my personal files and my online activity
in the "PERSONAL PROFILE"?

Fred964 said:
The phone is mine, and there is no plan
of internet hired by the company.
It's my personal cell phone, and for me to get
view emails and talk to people from
within the organization, I had to enable
the "work profile".
So I had my personal and work profile
on my personal device.
My question is: my company can see
my personal files and my online activity
in the "PERSONAL PROFILE"?
Click to expand...
Click to collapse
I created a second user on my phone named "Company".
If I do this it asks me if I wan't to turn on phone calls and SMS and then warns that
Call and SMS history will be shared with this user.
Click to expand...
Click to collapse
That makes sense, since I (as the owner) can decide whether or not other users of my phone can access that data.
I tried to access owners files via filemanager from "Company" account. I couldn't see anything.
I tried the same but via adb using a root shell -> I had full access to owners files.
Owner has a VPN active. I tried to access that VPN from within "Company". Didn't work.
Tried to access apps from within "Company" -> no luck.
Checked settings -> some are gone, some aren't. E.g. I can see my paired devices (paired from owner) when I'm in "Company" account.
Soo, to answer your question:
Fred964 said:
My organization that created the work profile, can have access to my browsing history, data on the device (such as photos, application files, etc.), time I spend using my cell phone, contacts, call logs, and other data personal profile?
I have already visited the google instructions page, but I was still unsure because my organization installed some network certificates and the warning "Your organization can monitor network traffic ..."
Click to expand...
Click to collapse
Access to browsing history, data, contacts? No.
Time spend? I don't know but in battery usage settings I can see how much battery has been used by the owner account.
Call logs? Yes, If you accepted that.
Your language? Yes.
About certificates: I don't know excactly what they do (I figured if you turn them off your device cannot connect to the internet anymore if that certificate is needed for that connection attempt) but you can go to Security -> Encryption & credentials -> Trusted credentials and turn them off while your in your personal account.
However: One questions remains: Does the profile your company created somehow differ from the one you can create manually via settings? I don't think so, so above things should be valid.
If that's an option you could also ask your company directly (even though I can understand if you might not want to trust them).

Related

WSJ: Apps Go Too Far In Sharing Your Info To Third Parties

A list of popular Phone spyware. http://blogs.wsj.com/wtk-mobile/
boogieTilt said:
A list of popular Phone spyware. http://blogs.wsj.com/wtk-mobile/
Click to expand...
Click to collapse
(Bump)
CategoryUtility
PlatformAndroid
Author / PublisherZedge
TypeFree
Has a privacy policy?Yes, in the app and on the website.
The Journal tested 101 popular smartphone apps to see what data about the phones, their users, and their locations they gathered and revealed to others. The Journal also reviewed what information the app tells users it will collect, and whether it has a privacy policy. Here is a summary of those findings.
Explicitly Asks Permission to Access
Read Contact Data (access data in your address book)
Read Internet's history and bookmarks (Web browsing information)
Full internet access (Can send data out about you)
Read phone state and identity (access unique IDs on your phone)
Read system log files (access to files on how you use the phone and apps)
Coarse (network-based) location (based on Wi-Fi and cell phone towers)
Fine (GPS) location (based on global positioning system)
Sends to Third Parties
Phone ID
Zedge says the application requests to read and write contact data in order to set contact ringtones, and that it does not store this information.
« Previous
YouTube (Android)

New Forensics Tool Can Slurp a Phone’s Data via the Cloud

Time to "double wrap" the hat with tin foil...
New Forensics Tool Can Slurp a Phone’s Data via the Cloud
The police don't even need to touch your phone anymore to know how you've been using it. A new off-the-shelf forensics tool lets cops retrieve all the data they want from your iPhone by accessing its contents through iCloud.
The software, developed by ElcomSoft, lets investigators retrieve user data associated with iPhones from Apple's iCloud online backup service, reports The Register. There's a thorough descripton of how the technology works on ElcomSoft's website, but from The Register:
"iCloud backups offer a near real-time copy of information stored on iPhones including emails, call logs, text messages and website visits. iCloud backups are incremental. When set up to use the iCloud service, iPhones automatically connect to iCloud network and backup their content every time a docked device gets within reach of a Wi-Fi access point.
"'While other methods require the presence of the actual iPhone device being analyzed or at least an access to device backups this is not the case with iCloud,' ElcomSoft chief exec Vladimir Katalov explained. 'With a valid Apple ID and a password, investigators can not only retrieve backups to seized devices, but access that information in real-time while the phone is still in the hands of a suspect.'"
Of course, the solution does require access to the Apple ID and password of the person who's being snooped on and they might not be easy to obtain. But, once those details are in place, the data can be swiftly downloaded, unencrypted. Nice. [ElcomSoft via The Register]
Interesting. I suppose something like this could happen with Google eventually as well, but the only thing that I ever backup are contacts. There was a story posted recently about the FBI issuing a warrant to Google to get access to a pimp's phone because they couldn't crack his unlock pattern.
http://arstechnica.com/tech-policy/...droids-pattern-lock-serves-warrant-on-google/
Even with this, they can only get a limited amount of his data. Google only allows for syncing of Contacts, Calendar, and Gmail, so if he doesn't use it as a main source for data or have his other email linked too it they still won't gain much info. Not sure why the warrant asks for texts because last I checked even Wireless providers only keep logs of numbers texted, not the messages themselves, correct?
Anyway, while this doesn't seem an issue as it requires a warrant, as you said if someone got access to an AppleID and password for malicious purposes it's open season.

Is my personal data secure if I set up my device to receive work email?

As the title states I will be setting up a new personal device I'll be getting this weekend. My current device has my work, email, and calendar in addition to my personal Google variants. Last time I set it up all that happened is that my request was "quarantined" until I call in the help desk so that they could verify that I signed an agreement to abide by the mobile policy. The agreement does state that they reserve the right to access all data.
Is it technically possible access all data just by having these accounts set up or is there software that needs to be set up on the device?
Thanks

Fitbit/Jawbone/... hack

Hi,
With our smartphones and apps we already send quite a lot of data to third parties.
I am interested by a wearable device such as a Fitbit or Jawbone (to mention only popular ones) to track my daily activities but I don't want to send more data to more third parties. In addition, if one of these companies decides to stop some products or shut down their servers, these devices would probably stop working.
As they all provide an Android app to sync the smartphone and the device to fetch the data and display it, I am wondering why it would be requested to send data to their servers. Does anyone know if these app is working properly without an active connection to these servers? Is there any way to block these connections without a rooted phone? If rooted, do you think updating the hosts file would be enough to block connection?
Aside it, I am wondering if it would be possible to redirect this traffic to a personal server to fill a personal database? Is the traffic secured, via SSL for example, between the app and the server? We can imagine creating an open source project to be installed on our personal RaspberryPi (for example) to display data in a more friendly way on desktop without giving access to private data to big companies.

Encrypting All Outgoing Traffic

Hey there XDA
So I was reading this article the other day that pertains to security and encryption on the Android Operating System
http://www.bibliotecapleyades.net/sociopolitica/sociopol_cia38.htm
Basically what is says is that even if you use encryption in apps there's nothing preventing people from accessing your devices mic or camera
But I was thinking what if you encrypt ALL outgoing traffic? Now I'm not the most well versed guy when it comes to technology but I've heard about for example SSH tunnels
So I found this guide on how to setup one on Android: https://www.howtogeek.com/121698/how-to-route-all-your-android-traffic-through-a-secure-tunnel/
Would this effectively encrypt all outgoing data?
Eklondh said:
Hey there XDA
So I was reading this article the other day that pertains to security and encryption on the Android Operating System
http://www.bibliotecapleyades.net/sociopolitica/sociopol_cia38.htm
Basically what is says is that even if you use encryption in apps there's nothing preventing people from accessing your devices mic or camera
But I was thinking what if you encrypt ALL outgoing traffic? Now I'm not the most well versed guy when it comes to technology but I've heard about for example SSH tunnels
So I found this guide on how to setup one on Android: https://www.howtogeek.com/121698/how-to-route-all-your-android-traffic-through-a-secure-tunnel/
Would this effectively encrypt all outgoing data?
Click to expand...
Click to collapse
Not really, setting up an SSH tunnel will only encrypt your traffic between your device and your server, at some point most traffic will have to enter the internet in just as secure manner as it does now so that you can view a website for example, it will add another layer of security, but really only useful for privacy from those on your local network or (if your server is outside your ISP network) from your ISP also (but you'd have to change your DNS servers also or they can get info from there about sites you visit)
Also non of that will stop the issue you mention above about gaining access to your camera, mic, files etc that to beat encryption they just have to gain access to your phone, that could be as simple as sending you a malware link to your email, Whatsapp or whatever, which you visit. Which seems to be what my mum did 2 days ago, there was a well crafted email that appeared to be from Genes Reunited making specific reference to her personal private data & contacts in her account so she clicked the link, now she has no internet access & other issues on tablet, but of course I can't log in to fix from here & she can't follow my instructions over the phone properly! The email password she gave me doesn't work (I wanted to examine the file she clicked on), though there was no confirmation via txt of password changed. So right now I'm not sure as could be related to the TalkTalk hacks.... Or just my mum! Rant over!
So in short no, ssl is not a simple solution
this might help. https://www.torproject.org/
"err on the side of kindness"
IronRoo said:
Not really, setting up an SSH tunnel will only encrypt your traffic between your device and your server, at some point most traffic will have to enter the internet in just as secure manner as it does now so that you can view a website for example, it will add another layer of security, but really only useful for privacy from those on your local network or (if your server is outside your ISP network) from your ISP also (but you'd have to change your DNS servers also or they can get info from there about sites you visit)
Also non of that will stop the issue you mention above about gaining access to your camera, mic, files etc that to beat encryption they just have to gain access to your phone, that could be as simple as sending you a malware link to your email, Whatsapp or whatever, which you visit. Which seems to be what my mum did 2 days ago, there was a well crafted email that appeared to be from Genes Reunited making specific reference to her personal private data & contacts in her account so she clicked the link, now she has no internet access & other issues on tablet, but of course I can't log in to fix from here & she can't follow my instructions over the phone properly! The email password she gave me doesn't work (I wanted to examine the file she clicked on), though there was no confirmation via txt of password changed. So right now I'm not sure as could be related to the TalkTalk hacks.... Or just my mum! Rant over!
So in short no, ssl is not a simple solution
Click to expand...
Click to collapse
Heh, **** man.. Hope she sorts it out
Now I think I've decided to use an SSH tunnel paried with RSA authentication for the time being, it seems good enough for me
mrrocketdog said:
this might help. https://www.torproject.org/
"err on the side of kindness"
Click to expand...
Click to collapse
Tor seems awesome
The proper way to achieve this is using a vpn which permits flexibility on the networking side. I use openvpn server on my home computer and i connect my phones to it. It is set to redirect all traffic through the encrypted tunnel which is forwarded to the internet through my home computer.
Now as noted before the information still goes out to the net at some point and comes back. Encrypting traffic does not help if you click on something malicious out there.
It does help to prevent the directly connected network to snoop on your actual traffic though. Handy when you connect to free wifi etc. Also you can filter traffic by application on the phone or by destination on the other side on the server.

Categories

Resources