TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Fake_contacts: Android app to create fake phone contacts, to do data-poisoning

499 pointsby karlztabout 4 years ago

50 comments

otterleyabout 4 years ago
Recently Apple added a feature to iOS that allows you only to allow selected photos to be accessible by an app. This allows the user to respond positively to an access request, but allow the app to see only a subset (or zero) actual photos.<p>It would be a very useful feature for Apple to do the same for contacts: the app would think it&#x27;s getting access to your contacts, but would only actually receive a subset of them, and be none the wiser. This would be a tremendous boon for privacy.
评论 #26286688 未加载
评论 #26289792 未加载
crazygringoabout 4 years ago
I don&#x27;t see what the point is.<p>&quot;Data poisoning&quot; gives companies a bunch of fake contacts... on top of all your real ones?<p>Who cares? So they send some e-mails to addresses that don&#x27;t exist or something? So it takes up an extra 1% of disk space in their database?<p>If you could share an empty address book then that would actually preserve the privacy of your contacts. But this doesn&#x27;t do that.<p>I don&#x27;t get it.
评论 #26289639 未加载
评论 #26287004 未加载
评论 #26287312 未加载
评论 #26287229 未加载
评论 #26291745 未加载
评论 #26287428 未加载
评论 #26289551 未加载
评论 #26291744 未加载
bredrenabout 4 years ago
Clubhouse requires contact list in order to get invites, which are required to sign up right now.<p>I get why they are doing this, and it caused me to share my contacts with them.<p>However, I resented it and it put me immediately in a defensive posture with the product and company.<p>There is no possible way to trust a company with your contact list and Apple should make it how Photos works now--where you can select which data to share. There are some folks I don&#x27;t even want to possibly find in a social app.
评论 #26286475 未加载
评论 #26286969 未加载
评论 #26286873 未加载
评论 #26286547 未加载
评论 #26286797 未加载
评论 #26287282 未加载
评论 #26286796 未加载
评论 #26286689 未加载
评论 #26287682 未加载
评论 #26287602 未加载
评论 #26286594 未加载
评论 #26343955 未加载
评论 #26287395 未加载
评论 #26288661 未加载
评论 #26287239 未加载
评论 #26289918 未加载
评论 #26288991 未加载
评论 #26287142 未加载
评论 #26287622 未加载
评论 #26286488 未加载
评论 #26290002 未加载
评论 #26287165 未加载
jpmattiaabout 4 years ago
Not exactly on topic, but historical context maybe: Long ago (early 90s?) when it was guessed&#x2F;assumed that intelligence agencies were scanning emails, emacs was still among the best ways to read and send email. So emacs provided a handy function to append a random list of &quot;hot&quot; words to each outgoing email in the signature, just to degrade the signal-to-noise of such surveillance.<p>It&#x27;s still there today, and you can see the output via M-x spook.
评论 #26286760 未加载
评论 #26287034 未加载
cyberlababout 4 years ago
Remember: some apps check for what apps are installed on the device, and if they see this installed they can deduce you&#x27;re poisoning the well.<p>Also if you want to research obfuscation and how it thwarts surveillance, check these:<p><a href="https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;11&#x2F;obfuscation_as_.html" rel="nofollow">https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;11&#x2F;obfuscation_a...</a><p><a href="https:&#x2F;&#x2F;www.science20.com&#x2F;news_articles&#x2F;obfuscation_how_to_hide_from_online_surveillance-164418" rel="nofollow">https:&#x2F;&#x2F;www.science20.com&#x2F;news_articles&#x2F;obfuscation_how_to_h...</a><p><a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2015&#x2F;oct&#x2F;24&#x2F;obfuscation-users-guide-for-privacy-and-protest-online-surveillance" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2015&#x2F;oct&#x2F;24&#x2F;obfuscati...</a><p><a href="https:&#x2F;&#x2F;adnauseam.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;adnauseam.io&#x2F;</a><p><a href="https:&#x2F;&#x2F;bengrosser.com&#x2F;projects&#x2F;go-rando&#x2F;" rel="nofollow">https:&#x2F;&#x2F;bengrosser.com&#x2F;projects&#x2F;go-rando&#x2F;</a>
评论 #26286793 未加载
评论 #26286709 未加载
ccleveabout 4 years ago
This is a common technique in the mailing list industry. It&#x27;s called &quot;salting&quot;. You add fake names, but real email addresses, street addresses, or post office boxes. You then monitor what shows up in these places addressed to &quot;Mr. Fake Name&quot;. It&#x27;s how mailing list companies monitor who is using their lists and helps control misuse.
评论 #26289065 未加载
评论 #26287819 未加载
washadjeffmadabout 4 years ago
I seem to remember CyanogenMod having a per-app sandbox feature around 2013 that returned blank info from a virtual root.<p>Like many point out, this isn&#x27;t data poisoning, especially if there aren&#x27;t metric-breaking honeypots around the web seeding these services with enough noise to make these collection practices useless, which there are not.<p>A more effective alternative might be hashing real contacts to generate seeds of complete but false profile information. Apps thinking they got the mother lode wouldn&#x27;t be able to assign confidence to any results they didn&#x27;t have duplicates of, and slowly over time, groups who used this would become worthless.
评论 #26289052 未加载
Waterluvianabout 4 years ago
Apps using contacts is a $#%$ing anxiety attack for me. The scum companies don&#x27;t care. They just want more leads. But for me, it&#x27;s this fear that they&#x27;re going to spam my exes and old roommates and bosses and professors and landlords and everyone who ends up added to my contacts.<p>Signal did that to me last week. This person I&#x27;m not on speaking terms with got Signal and it added us and announced to each other we were on it and put our empty conversation onto my list of convos.<p>Phone contact lists are a complete $&amp;^*ing disaster and Apple needs to make it far more clear what specific contacts I share access to.
评论 #26286584 未加载
评论 #26287368 未加载
评论 #26288844 未加载
rasseabout 4 years ago
This makes me wonder if anyone has set up canary emails or phone numbers in their phone contacts.
评论 #26286731 未加载
评论 #26286422 未加载
评论 #26286414 未加载
评论 #26286536 未加载
geniiumabout 4 years ago
It&#x27;s pretty sad that we get to this point. Creating fake contact in our phones to create &quot;data-poisoning&quot;.<p>Where the hell are we going?
评论 #26291735 未加载
augsteinabout 4 years ago
How far have we come to even consider poisoning the data on our own devices, because we know it will be harvested and resold by 3rd parties.
vmceptionabout 4 years ago
To everyone talking about Clubhouse, there isn&#x27;t an android version so this code is not useful as it is only for android
评论 #26288072 未加载
annoyingnoobabout 4 years ago
I&#x27;m of the opinion that personal data is not like a currency and should not be seen as a form of currency.<p>If you want to barter then I want to negotiate, no one sided contracts. Can&#x27;t make a deal? Your loss then.
floatingatollabout 4 years ago
Is it possible to create a network of contacts that triggers worst-case memory and cpu scenarios when the network is reconstructed from contacts?<p>Or, put another way, can a collection of people doing this construct a set of synthetic contacts spread out in various ways across their devices, such that anyone doing contact analysis sees their analyses slow down, drain resources, or crash altogether due to network structure?
评论 #26288028 未加载
neilvabout 4 years ago
&gt; <i>The app is designed to be very simple and fail silently. If you deny permission to access contacts, the app will not complain, it just will not work.</i><p>I don&#x27;t understand the reason behind &quot;designed to...fail silently&quot; in this way, in a privacy&amp;security measure.
aboringusernameabout 4 years ago
Can someone please explain to me how the collection of contact data is in any way legal under the GDPR and why Microsoft (Windows), Apple&#x2F;Google haven&#x27;t been required to make changes to prevent abuse of this permission (such as selecting specific contacts).<p>I&#x27;d also like to not know why if my contact data is shared, I am not informed of this. If my data is uploaded by Google to their servers, I should know. If somebody chooses to share my data with $app I should know, and, be able to &quot;opt-out&quot; of being included, perhaps (although it should be opt-in!)<p>Being able to mass collect what is often the most sensitive information means that consistent data is now a liability; keeping the same number&#x2F;email can be useful for cross-referencing. Ideally you should rotate what data you can (physical address&#x2F;location is obviously extremely difficult). Everything else is possible (browsers&#x2F;IP addresses&#x2F;emails&#x2F;User Agent strings, phone numbers etc etc)<p>The best idea is to &quot;troll&quot; with your data; put insane items in your logged in basket (ebay&#x2F;amazon etc), like sex toys. You can even make an order (and refund it) to further poison the well. Log in to Google and do some disgusting searches, and train algorithms to have the &quot;wrong idea&quot; about you, this is a reality we&#x27;re now facing as this data can (and will) be used against you at any opportunity.
评论 #26286723 未加载
评论 #26286828 未加载
评论 #26289804 未加载
bschneabout 4 years ago
The problem with this approach is twofold:<p>a) At the margin, a few people doing this does _nothing_ to mess with big companies&#x27; data collection &amp; analysis. But opting out also has the same problem, obviously, so at least it&#x27;s not doing worse.<p>b) In the absence of sandbox &#x2F; selective sharing features like other commenters have mentioned, or you going so far as to _only_ keep fake contacts in your phone, using this approach requires you to also share your actual contacts with the app, thus giving away PII of unconsenting third parties. Yes, I&#x27;d rather blame the app developers for collecting this data in the first place, but I&#x27;d still prefer not to give my contacts away whenever I can reasonably withhold them.
aasasdabout 4 years ago
On Android, IIRC I&#x27;ve seen a dialer app that stores contacts in its own database instead of the system thing. Seems to be a better approach than this—at least if other apps also don&#x27;t write to the shared contacts.<p>(It was probably an open-source dialer on F-Droid, but don&#x27;t remember exactly which one.)<p>Anyway, an even better approach of course is to tell data-slurping apps to bugger off.<p>Edit: come to think of it, maybe alternative Android ROMs could fence the contacts so that an app only sees its own unless the user specifically selects someone. I guess this is similar to Apple&#x27;s trick with Photos.
collaborativeabout 4 years ago
Phone numbers are too public. The reason why they&#x27;re used by messaging apps is that they are a goldmine to have. They actually make it harder to chat (ever tried using Whatsapp&#x2F;Signal on a PC? Yes, you&#x27;ll need to have it installed on your phone first (and have given over your contacts))<p>That&#x27;s why I chose to set (masked) emails as the primary id on groupsapp.online and even these can&#x27;t be seen publicly unless you share a &quot;group&quot;. Others will just see XXXX@gmail.com
评论 #26289079 未加载
atum47about 4 years ago
You can always use bash or python to create vcards and import them in your phone.<p>I&#x27;ve used this technique once to generate a bunch of numbers to find the whatsapp of a person, works just fine
0df8dkdfabout 4 years ago
That is why we should have a custom app for contacts with custom encryption (like keepass) to store our real contact. So not any app or apple or google has access them.<p>For some ppl like political of activist fundraisers, contact info privacy are utter most important. In fact some of them still store it on rolodex, and will not put any of that into digital form. And as a software developer I actually support that tremendously.
adsharmaabout 4 years ago
I wonder if people have thought about another variant of this. An app that maintains two address books and switches between them based on context.
评论 #26286529 未加载
nbzsoabout 4 years ago
All the shady data schemes and dark patterns in todays idea of software business motivated me to look to my phone as an enemy and using the web cautiously all the time. Actually the idea of hyperconnected future in which 24&#x2F;7 monitoring of the individuals will be normalised and mandatory makes me cringe. The Internet from force of good is turning to dystopian toolchain by the hour. And all is because we as society cannot find an effective way to limit the greed.
评论 #26287469 未加载
评论 #26288299 未加载
评论 #26287660 未加载
评论 #26287350 未加载
nomabout 4 years ago
Hm can it be estimated &#x2F; is there public information about how many phone numbers are taken? E.g. I generate a valid number for one country or state, how likely is it that the number is in use or registered?<p>I once got a phone call from a university student for a survey for their project and they told me they generate them randomly which makes me really wonder, how likely is it?
ckgjmabout 4 years ago
Things might change big time in this space. Apple and Facebook are slugging it out on tracking personal data. <a href="https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;facebook-vs-apple-heres-what-you-need-to-know-about-their-privacy-feud&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;facebook-vs-apple-heres-what-you-n...</a>
2Gkashmiriabout 4 years ago
Ever since ios 5 I think, there has been permission control behind a separate password. Why cant android replicate that? Nowadays, there seems to be one &quot;permissions protection&quot; but sadly all apps say &quot;you seem to have contacts protection enabled. Please disable for best results&quot;. Whats the point?
I_am_tiberiusabout 4 years ago
Just reading the headline and thinking: Providers (like google) may still be able to filter out fake profiles if those fake contacts don&#x27;t have relations to each other. Meaning that if only you have a contact with a random number, and nobody else has, it&#x27;s most likely fake.
nvoidabout 4 years ago
I was looking through my contacts the other day, deleting some people I don&#x27;t speak to any more. Its interesting that with 5 or so unique enough contacts I could be identified. If they were sufficiently unique, no one in the world could possible know those 5 people. Scary thought.
fsfloverabout 4 years ago
Or just stop using operating systems and apps which you don’t trust and switch to GNU&#x2F;Linux phones.
aww_dangabout 4 years ago
Imagine if your fake contact&#x27;s randomly created email or phone number is on a terror watch list.
评论 #26286346 未加载
评论 #26286314 未加载
naebotherabout 4 years ago
How does this help me? Malicious apps are still going to scoop up my real contacts, right? What if one of the random phone numbers belongs to someone deemed a &quot;terrorist&quot; by one the imperial powers and I&#x27;m judged guilty by association?
GekkePrutserabout 4 years ago
I wonder if this works at all..<p>These companies simply use your contacts to do contact mapping to other users. Including fake ones will do nothing as they don&#x27;t point anywhere. Big Data will just filter them out.
_trampeltierabout 4 years ago
I have no contacts at all on my phone, I created something by myself. Now I think it would be funny to brute force Androids contacts and just add every number of my countrys phone providers :-)
IncRndabout 4 years ago
If real problem is that your contacts can be stolen, it makes no sense to add noise to them instead of securing them.<p>Do you install lots of trivial apps, which you give permission to access your contacts?
yaloginabout 4 years ago
This is not achieving anything positive. I don’t which privacy threat it’s fixing, other than adding a new app into the mix that could at some point in the future suck up the contacts itself:)
评论 #26288051 未加载
tyingqabout 4 years ago
Bsd style globbing is handy for this sort of thing. Like in Perl:<p><pre><code> use File::Glob qw&#x2F;bsd_glob&#x2F;; my @list = bsd_glob(&#x27;This is nested {{very,quite} deeply,deep}&#x27;);</code></pre>
the_local_hostabout 4 years ago
I have to say the spirit of this fake_contacts app is very appealing. Why stop at defending your data, when you can attack?
评论 #26288017 未加载
dredmorbiusabout 4 years ago
Data-poisoning is an attractive approach (and one I&#x27;ve considered and occasionally practiced) but it does relatively little as a practical matter. @cyberlab posted some good links here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26286686" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26286686</a><p>Cory Doctorow also addressed this in a recent Reddit AMA: <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;privacy&#x2F;comments&#x2F;j444u4&#x2F;how_to_destroy_surveillance_capitalism_an_ama&#x2F;g7jf6sf&#x2F;?context=3" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;privacy&#x2F;comments&#x2F;j444u4&#x2F;how_to_dest...</a><p>From the harvesters&#x27; perspective, a long list of pattern-matching identifiers with no visible history anywhere else online ... will tend to get junked fairly readily. A small increase in undeliverable addresses from a swipe ... won&#x27;t increase costs much.<p>Creating wholesale online personas (effectively: bots and troll farms writ large) <i>might</i> start posing a challenge, but those would still likely give off a strong signal of falseness due to lack of correlation with other identifiers, most notably devices of their own, credit cards or other payments data, other data-linked services (transit or toll passes, etc.).<p>Ultimately the question is <i>why</i> are you doing this and <i>what</i> do you hope to accomplish?<p>(Though I&#x27;ve salivated a few times contemplating a system that would stream endless bits as responses to cookie or similar requests, just for shins and grits.)
paulie_aabout 4 years ago
Data poisoning needs to become a standard practice. Make the &quot;valuable&quot; ad data useless
评论 #26287796 未加载
评论 #26287343 未加载
867-5309about 4 years ago
slightly increased anonymity through user-fed obfuscation? if you don&#x27;t want an app to access your contacts, deny it. if it insists, delete it. the only app on my phone which has access to contacts is.. Contacts
neonihilabout 4 years ago
I love this! We need more of this. Let’s poison every data that is collected!
heavyset_goabout 4 years ago
This can be easily bypassed by cross referencing contact lists on the backend.
ezconnectabout 4 years ago
Why not jut create a contacts app and use that as your private contact apps.
ketamine__about 4 years ago
Is there a limit on the number of contacts Clubhouse would sync?
评论 #26286604 未加载
sanxiynabout 4 years ago
What a great idea. Let&#x27;s do more of these.
ianlevesqueabout 4 years ago
Or click “Don’t allow”? What’s the point?
andixabout 4 years ago
Just don&#x27;t share your contacts with apps that steal them and use them for marketing purposes.<p>It is also illegal to do it (GDPR), if you don&#x27;t have the permission of every single person in your contacts.
jp57about 4 years ago
Can we get little Bobby Tables in there?<p><a href="https:&#x2F;&#x2F;xkcd.com&#x2F;327&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;327&#x2F;</a>
ficklepickleabout 4 years ago
Sad state of affairs. AOL couldn&#x27;t kill the open web, but &quot;apps&quot; have.<p>The user agent should respect your wishes, but instead we are reduced to this insane work-around.<p>Surveillance capitalism needs to die in a fire. To anybody working on that shit: I hate you. Personally, as an individual, I wish you harm.<p>OK, that was hyperbole, but I do love the open web. RIP.
parkingpeteabout 4 years ago
Hmmm, not good