TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A family tracking app was leaking real-time location data

51 pointsby s1512783about 6 years ago

7 comments

okmokmzabout 6 years ago
&gt;TechCrunch spent a week trying to contact the developer, React Apps, to no avail. The company’s website had no contact information — nor did its bare-bones privacy policy. The website had a privacy-enabled hidden WHOIS record, masking the owner’s email address. We even bought the company’s business records from the Australian Securities &amp; Investments Commission, only to learn the company owner’s name — Sandip Mann Singh — but no contact information. We sent several messages through the company’s feedback form, but received no acknowledgement.<p>And people trust this with the real time location data of their children so they can keep them &quot;safe&quot;. Absolutely ridiculous
unixpickleabout 6 years ago
Not the first time someone left a MongoDB database exposed to the wild, and it won&#x27;t be the last. It&#x27;s an easy thing to do, especially since MongoDB is so popular for small single-server projects.<p>A few years ago, I discovered the open MongoDB database of an educational website called Kaizena, which we were using in my high school English class. When I reported the problem to them, they quickly fixed it (probably with some iptables hack). They even wrote a blog post [1] about fixing it, where they claimed they added &quot;additional firewalls to the database&quot;. More like _one_ firewall.<p>As a side note, Kaizena also had another security bug where their API would return JSON payloads that had private information in it (e.g. the voice feedback for other students&#x27; work). I reported it years ago, but who knows if it&#x27;s fixed.<p>[1] <a href="https:&#x2F;&#x2F;blog.kaizena.com&#x2F;post&#x2F;68627783859&#x2F;a-note-on-security" rel="nofollow">https:&#x2F;&#x2F;blog.kaizena.com&#x2F;post&#x2F;68627783859&#x2F;a-note-on-security</a>
评论 #19648488 未加载
jmullabout 6 years ago
As bad as it is, I can understand accidentally leaving a database accessible (they generally <i>need</i> to be accessible and setting just the right amount of accessible can be complex).<p>But this:<p>&gt; ...plaintext passwords...<p>Why, oh why, store plaintext passwords?!?
评论 #19645582 未加载
评论 #19645520 未加载
cyberfartabout 6 years ago
&gt; We contacted one app user at random who, albeit surprised and startled by the findings, confirmed to TechCrunch that the coordinates found under their record were accurate.<p>So they accessed the database as well as personal information of users? Is this not a crime whether or not the database was unprotected?
评论 #19647109 未加载
评论 #19645728 未加载
napoluxabout 6 years ago
Are this kind of apps really a thing?
评论 #19645228 未加载
评论 #19645548 未加载
评论 #19645205 未加载
评论 #19645180 未加载
评论 #19645207 未加载
bobbydreamerabout 6 years ago
We should let google do it and give us the details, they do it better as they have already invested a lot in it, doing it and keeping it as secret or FB do it. Basically an Android app asking other person to accept to track their location and send it to other person when they want it. It should be that simple.
apayanabout 6 years ago
Shameless plug: I&#x27;ve built a family location sharing app that uses end-to-end encryption, so you don&#x27;t have to worry about this sort of data leak (or any other). It&#x27;s available for iOS and Android. (It&#x27;s in beta, but quite functional).<p><a href="https:&#x2F;&#x2F;www.zood.xyz" rel="nofollow">https:&#x2F;&#x2F;www.zood.xyz</a>
评论 #19646129 未加载
评论 #19646333 未加载