I provvedimenti spiegati alle aziende
con guide, checklist, modelli; AI assisted
Osservatorio a cura del dott. V. Spataro 



   documento 2023-03-04 ·  NEW:   Appunta · Stampa · Cita: 'Doc 96481' · pdf

MILITARY GRADE CYBER PROTECTION TikTok Analysis

abstract:



Documento annotato il 04.03.2023 Fonte: GPDP
Link: https://internet2-0.com/wp-content/uploads/2022/08




analisi:

L'analisi è riservata agli iscritti. Segui la newsletter dell'Osservatorio oppure il Podcast iscrizione gratuita 30 giorni




index:




testo:

E

estimated reading time: 9 min internet2 -0.com | 0



Author



MILITARY - GRADE
CYBER PROTECTION
TikTok Analysis
Thomas Perkins



Editors



David Robinson



Michael Lammbrau , Ph.D



Robert Potter
McWilliams


Authors

internet2 -0.com | 1

TikTok Analysis
Table of Contents

Executive Summary ................................ ................................ ................................ ................................ ......................... 1
Introduction ................................ ................................ ................................ ................................ ................................ ........ 2
User Permissions and Thi rd -Party Data Access ................................ ................................ ................................ ... 3
Device and user data harvesting ................................ ................................ ................................ ................................ 8
IOS connects to mainland China ................................ ................................ ................................ .............................. 13
Conclusion ................................ ................................ ................................ ................................ ................................ ........ 14

Executive Summary

This report is a technical analysis of the source code of TikTok mobile applications Android
25.1.3 as well as IOS 25.1.1 . Analysis of the Android applicat ion was performed using a Galaxy
S9 cell phone . Internet 2.0 conducted static and dynamic analysis of the source code between
01 -12 July 2022. This report aims to analyse Tik Tok device and user (customer) data collection.
Prepared by Internet 2.0 , this rep ort is for policy makers and le gislators to make evidence -
based decisions. TikTok is a dominant social media application and is the 6 th most used
application globally with forecasted advertising revenues in 2022 expected to be USD12 billion.
In our analysi s the TikTok mobile application does not prioritise privacy . Permissions and
device information collection are overly intrusive and not necessary for the application to
function . The following are examples of excessive data harvesting.
• Device Mapping. The application retrieves all other running applications on the phone .
TikTok also gathers all applications that are installed on the phone. In theory this
information can provide a realistic diagram of your phone.
• Location. TikTok checks the device loc ation at least once per hour.
• Calendar. TikTok has persistent access to the calendar.
• Contacts. TikTok has access to contacts and if the user denies access, it continuously
requests for access until the user gives access.
• Device information . TikTok has code that collect s the following device detaile d
information on Android .
o Wi -Fi SSID
o Device build serial number
o SIM serial number
o Integrated Circuit Card Identification Number (this is global unique serial
number that is specifically tailored to your SIM card)
o Device IMEI
o Device MAC address
o Device line number

internet2 -0.com | 2

TikTok Analysis
o Device voicemail number
o GPS status information (updates on the GPS location)
o Active subscription information
o All accounts on the device
o Complete access to read the clipboard (dangerous as Password managers use
clipboards )
Also of note is that TikT ok IOS 25.1.1 has a se rver connection to mainland China which is run by
a top 1 00 Chinese cyber security and data company Guizhou Baishan Cloud Technology Co., Ltd .
Introduc tion
TikTok is currently one of the dominant social media application in the market . It is the 6 th most
used application . As at September 2021 TikTok has over 1 billion activ e users globally with
142.2 million users in North America. 1 It has been download ed over 3.5 billion times as of
January 2021 , with 43.7% of users 18 -24 years old and 31.9% 25 to 34 years old. TikTok ’s
projected advertising annual revenue in 2022 will hit USD12 billion , up from USD1.41 billion in
2020. 2

Figure 1. Projected TikTok ad vertising revenue (see footnote 2)
1 https://www.shopify.com/blog/tiktok -statistics 2 https://www.insiderintelligence.com/content/tiktok -douyin -digital -ad -spend

internet2 -0.com | 3

TikTok Analysis
Internet 2.0 conducted static and dynamic analysis o f the TikTok mobile application Android
25.1.3 as well as static analysis of the TikTok mobile application IOS 25.1.1 to understa nd user
and device data collection .3 The analysis also s eeks to confirm the existence of any mal icious
code or features of the application. We decompile d the source code of the application available
on the app stores and analysed it through multiple systems (including multiple sandbox
services) and manual source code reviews . This is divided into the following sections : user
permissions and third -party data access; device and user data harvesting; and conclusion.

User Permissions and Third -Party D ata Access
There are certain permissions that the Android documentation considers to be “dangerous”.
They are considered dangerous due to the permission providing additional access to restricted
data. For example, the ability to read all SMS messages could be conside red dangerous because
an application could send all your texts to a server and save the in formation for future use (such
as a malware). Unfortunately, TikTok makes use of a lot of these dangerous permissions . We
noted the Android version had many more than the IOS version . IOS has a justification system
where to gain a permission the d eveloper must justify why this permission is required before it
is granted. We believe the justification system IOS implements systematically limits a culture of
“grab what you can ” in data harvesting . The fact that TikTok had far more permissions for
Android over IOS is a good demo nstration of their culture when it comes to privacy .



3 This analysis provides impartial advice for users to evaluate the extent to which their data is collected for
privacy reasons. It allows policy advisors and legislators to make evidence -based decisions when discussing
privacy concerns with vendors. This report was written for a global audience and does not include any legal or
jurisdiction based regional assessments.
Figure 2a. TikTok Android access permissions rated as dangerous .

internet2 -0.com | 4

TikTok Analysis







Figure 2b. TikTok IOS access permissions rated as dangerous .
Device mapping
The Android application collects all other running and installed applications on t he phone (this
is an unnecessary function) , see figure 3. Theoretically, this information can provide a realistic
diagram of your phone.
Figure 3: Get all applications and running tasks on the device (green highlight) .

internet2 -0.com | 5

TikTok Analysis
GPS and Locations requests
The Android application queries the device GPS location at least once per hour while running.
This command is seen in figures 4 and 5.

Figure 4: Get location code .


Figure 5: TikTok get longitude and latitude data requests .

Contacts
The Android applicat ion requests access to user contacts . If the user denies access the
application will continuously ask for access. TikTok does this as it runs its code in a loop that if a
Boolean (true or false) is stored as false, it will keep prompting until given a true value (see
figure 6). It is normal for an application to initially request access to contacts but TikTok’s
persistent, endless harassment for user contacts access is abnormal. It reflects a culture that
does not prioritize privacy or a user’s preferences for privacy.

internet2 -0.com | 6

TikTok Analysis

Figure 6: The source code for Contact s information .

Figure 7: TikTok Contact s access request prompts while in app lication .

internet2 -0.com | 7

TikTok Analysis
Calendar
The Android applic ation has persistent access to read and modify calendar , see figure 8. TikTok
only uses the calendar for special circumstances , for example when there is a TikTok LIVE
event , based on our analysis. The persistency of access to the calendar is excessive in our
opinion.

Figure 8: Persistent calendar access .

External storage
TikTok Android application requests access to external storage. This is a standard command for
a social media application to store video and images. The aspect we list as excessive is TikTok
doesn’t just retrieve the ability to see folders it retrieves a list of everything available in the
external storage folder where the application has the access to place files , see figure 9.


Figure 9: List everything in external storage .

internet2 -0.com | 8

TikTok Analysis
Device and user data harvesting

Device Data
TikTok also has potential to harvest an exc essive amount of data about the device , it is
important to note that due to limitations with dynamic analysis it is not currently possible to
determine if any of this data is ever taken from the device , however, the Android application has
code that can gather the following additional device details. See figures 1 0-12
• Wi -Fi SSID
• Device build serial number
• SIM serial number
• Integrated Circuit Card Identification Number (this is global unique serial number that is
specifically tailored to your SIM car d)
• Device IMEI
• Device MAC address
• Device line number
• Device voicemail number
• GPS status information (updates on the GPS location)
• Active subscription information
• All accounts on the device
• Complete access to read the clipboard (dangerous as Password managers use
clipboards )

internet2 -0.com | 10


Figure 10: TikTok Data harvest image .

internet2 -0.com | 11

TikTok Analysis


Figure 11: TikTok Data harvest image .

internet2 -0.com | 12

TikTok Analysis



Figure 11 : TikTok Data harvest image
Figure 12: TikTok Data harvest image .

internet2 -0.com | 13

Of note : Joe’s Sandbox rated the Android application as malicious for Spyware and Evader
categories as seen in Figure 13 because of d evice and user data collection by the application and
evasive techniques the application uses to block any type of analysis . Many applications have
anti -sandbox run commands now to inhibit automatic analysis , the sandbox identifies these and
categories it in the evader category.














Figure 13 . TikTok rating as per Joe’s sandbox (https://www.joesandb ox.com/ ).

IOS connects to mainland China

TikTok are specific in their statement that TikTok user data is stored in Singapore and the US.
However, we found many subdomains in the IOS application resolving all around the world
including: Sydney, Adelaide and Melbourne (Australia) ; New York City, Las Vegas, San Francisco,
San Jose, Monrovia, Cambridge, Kansas City, Dallas , Mountain View (USA) ; Utama and Jakarta
(Indonesia), Kuala Lumpur (Malaysia), Paris (France), Singapore (Si ngapore) and Baishan
(China). During analysis we could not determine with high confidence the purpose for the China
Server connection or where user data is store d. The China server connection is run by 贵州白山
云科技股份有限公司 Guizhou Baishan Cloud Technology Co., Ltd a cloud and cyber security
company. The subdomain connected to the “China server connection ” resolved in multiple
locations around the world including in China. The Ip Address resolving to China regularly

internet2 -0.com | 14

TikTok Analysis
changed locations , however, connectivity to Bai shan Guangxi China was visible across a number
of different IP addresses over time . This was confirmed through the use of a number of security
products and methods, including virus total, Metasploit, security trails and sandboxing.
Interestingly, this company has been rated a top 100 Chinese cyber security company and in
2021 established a joint Big Data laboratory with Guizhou University .4 Of note only the IOS
version had this mai nland direct server connection . We could not find any direct server
connections with mainland China in the Android version of the application.

Conclusion

For the TikTok application to function properly most of the access and device data collection is
no t required. The application can and will run successfully with out any of this data being
gathered. This leads us to believe that the only reason this information has been gathered is for
data harvesting. It is also notable that the device only needs to ask the user for permission to
perform each of these actions once and then follow the user’s preferences. The application
however has a culture of persistent access or continuously asking for a decision reversal by the
user. The hourly checking of location is also unnecessary. Finally, device mapping, external
storage a ccess, contact s and third -party applications data collection allows TikTok the ability to
reimage the phone in the likeness of the original devi ce.











4 https://baike.baidu.com/reference/23443686/44e44NXRi0exRZo -8rbRsVSmZl -
hjxLfaZVO4j748emXOcfv_uNtLc1yLac09EyZEBSnmwlHmEjKgrSKyJq fjRJXffvnMrZx3fjyd7KgfZXHQTJqcQiSTTzNcY
s12v7vcNN_
https://baike.baidu.com/reference/23443686/cc63DG_6ZWBsyHhiqR45OVCvsMnuyzIROgdcmvvuXilWB48sb7
YhfKhpeWv0ZpsePYpHl2EMcS8LdZe2yWIZPp3rLCUtoQfy96e5 -_uuvbQ

internet2 -0.com | 15

TikTok Analysis






MILITARY - GRADE
CYBER PROTECTION
Australia United States
Level 1
18 National Circuit
Barton ACT 2600
ABN: 17 632 726
946
Suite 100
211 N Union St
Alexandria 22314
EIN: 86 -1567068
contact@internet2 -0.com


Link: https://internet2-0.com/wp-content/uploads/2022/08

Testo del 2023-03-04 Fonte: GPDP




Commenta



i commenti sono anonimi e inviati via mail e cancellati dopo aver migliorato la voce alla quale si riferiscono: non sono archiviati; comunque non lasciare dati particolari. Si applica la privacy policy.


Ricevi gli aggiornamenti su MILITARY GRADE CYBER PROTECTION TikTok Analysis e gli altri post del sito:

Email: (gratis Info privacy)






Nota: il dizionario è aggiornato frequentemente con correzioni e giurisprudenza