TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

App Analysis: Air Canada

167 pointsby tolienover 6 years ago

13 comments

nemothekidover 6 years ago
This is fun. Does this potentially mean that there analytics firms out there with tons of "screenshots" contained easily demasked credit card info probably sitting somewhere in an s3 bucket? That's a new attack vector I've never thought about.
评论 #19103022 未加载
评论 #19102628 未加载
rdiddlyover 6 years ago
This writeup has a nice, calm, "Your house is on fire" quality about it that I find refreshing.
评论 #19103007 未加载
avipover 6 years ago
Good writeup. There's absolutely no way this is not a PCI-DSS violation.
minimaxirover 6 years ago
What’s the data advantage of <i>taking and sending a screenshot of the app</i> instead of just sending user events (e.g. field filled, field selected, form submitted)?<p>A screenshot literally unstructures the data.
评论 #19102918 未加载
whoisjuanover 6 years ago
<a href="https:&#x2F;&#x2F;www.smartlook.com" rel="nofollow">https:&#x2F;&#x2F;www.smartlook.com</a><p><a href="https:&#x2F;&#x2F;www.appsee.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.appsee.com&#x2F;</a><p><a href="https:&#x2F;&#x2F;uxcam.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;uxcam.com&#x2F;</a><p><a href="https:&#x2F;&#x2F;userx.pro&#x2F;" rel="nofollow">https:&#x2F;&#x2F;userx.pro&#x2F;</a><p>That&#x27;s just a small sample of services that allow you to record the user&#x27;s screen or take screenshots). App session replay software has existed for years, and of course, they capture all the things that are going on the app including checkouts and profile data (unless you flag those screens on the SDK implementation).<p>Like someone already pointed out, that video or image will likely be stored somewhere (an S3 bucket or some static storage). I think anyone who is implementing these type of SDKs on their app needs to do their due diligence, and not push sensitive data to these third parties.
评论 #19104001 未加载
kslfkkdkdndnnover 6 years ago
We need more analysis like these calling out businesses that violate their users trust.
eastbayjakeover 6 years ago
This write-up doesn&#x27;t actually state where these unobfuscated images came from, so it&#x27;s not clear to me where (or whether) there are actually unobfuscated images in Air Canada&#x27;s system. Tools like Glassbox usually mark PII fields with CSS classes to blur&#x2F;redact fields when the screenshots are taken. It looks like the author may have found password and credit card fields without these CSS classes and manually recreated what the unobfuscated fields would look like with dummy data, but it&#x27;s also possible to configure these tools to not log entire pages or directories -- this is how payment pages are usually configured, with screenshotting completely disabled.<p>If the (anonymous) author simply mocked up what these screenshots _might_ look like if they were saved, that&#x27;s pretty misleading.
评论 #19103000 未加载
amolguptaover 6 years ago
I was once forced to integrate once such product in our app. We did mask what we thought was the sensitive information. Within days of release, the app was removed from the play-store for privacy violation. Had to remove the SDK to get back in business. So Google does use tools to detect such stuff and this was early 2017.
trhwayover 6 years ago
&quot;Peekaboo&quot; PCI compliance level.
franzwongover 6 years ago
I love the idea of this web site. But it is not so convincing when it is not HTTPS. (ok, I expected downvote)
评论 #19103362 未加载
评论 #19104344 未加载
poloteover 6 years ago
I was in charge of building this kind of product for another analytics company, this technology is called session replay, and it is used for many use cases, like : UX improvement&#x2F; support&#x2F; bug detections ...<p>Most of vendors record keyboard inputs and thus can record password as well as credit card information, there was an affair about it a few years ago [1]. To not have this issue, most of vendors provide a way to not record those information. It requires manual tagging of the website on the element that contains critical content.<p>But many of session replays vendors have many clients, and don&#x27;t force or don&#x27;t verify that all the critical information are masked. This is not GDPR compliant, because when the GDPR apply you need to consent of the user to record his PII, and you are not even allowed to record information like password, sexual orientation, credit card even if you have the consent.<p>Two things: - Nowadays on the web most of payment pages are not hosted on the client website, so those analytics tools are not included (but we still have many websites that don&#x27;t use third party for that) - This data is not (most of the time) recorded in a structured way, data of inputs is recorded as some element of an HTML, and thus it is not super easy to extract the information at scale<p>[1] <a href="https:&#x2F;&#x2F;freedom-to-tinker.com&#x2F;2018&#x2F;02&#x2F;26&#x2F;no-boundaries-for-credentials-password-leaks-to-mixpanel-and-session-replay-companies&#x2F;" rel="nofollow">https:&#x2F;&#x2F;freedom-to-tinker.com&#x2F;2018&#x2F;02&#x2F;26&#x2F;no-boundaries-for-c...</a>
评论 #19104621 未加载
mileszimover 6 years ago
Great read! Thanks for investigating this kind of thing, it&#x27;s beyond useful.
mr_toadover 6 years ago
Glassdoor claim to be able to screenshot web browsers as well. I didn’t know that was possible.
评论 #19103917 未加载
评论 #19103826 未加载
评论 #19103162 未加载
评论 #19104607 未加载