The built-in browsers of these social networks can monitor all your internet activity

The built in browsers of these social networks can monitor all

The browsers integrated into certain social network applications could collect a multitude of data through JavaScript code injected directly into web pages. This code would contain functions to collect all interactions, including passwords and credit card numbers.

You will also be interested


[EN VIDÉO] 3 unusual ways to store digital data
To store files, music or videos, most of us use DVD or hard drive. But researchers have developed sometimes surprising alternative methods.

Built-in browsers apps from some social networks can log all of your activity, including typed text, according to cybersecurity researcher Felix Kraus. It is in any case true iOSbut it did not analyze the versions android apps.

Users of TikTok, instagram, Facebook and Messenger are all exposed to surveillance when they open a link in these applications without going through an external browser. Each has its own built-in browser, which injects JavaScript code into viewed pages without the consent of either the user or the website.

A browser that behaves like a keylogger

Although it cannot say what data is actually collected, the JavaScript code contains all the functions necessary to record all interactions with the pages consulted, including the text entered (passwords, credit card numbers, etc.) , open links and even screenshots. This is the very principle of a keylogger.

Meta, Facebook parent companyas well as TikTok both replied that the code in question did not record any personal data. In the case of Meta, it would serve above all to allow not to be tracked by Meta Pixel (the equivalent to Google Analytics) when the user objects. On his side, TikTok indicated that his code is used for diagnostic and performance monitoring, such as page load times. However, it is difficult to imagine that these companies would ignore data collection when the code already contains all the necessary functions. In any case, there is a simple solution to avoid any surveillance risk. Always opt to open links in the default browser of the mobileand not in that of the application.

Interested in what you just read?

fs1