Hi @UIDAI 👋! Do I have to explain you how real #Android developers are working?
On his official #Playstore account. @UDAI published today an app called "NewTest" with blank screenshot and testingtestingtesting[...] as description 🤦♂️
Regarding how they used their #PlayStore account, I'm pretty sure they are unable to update the official #Aadhaar#android app because they lost the release key. Please @UIDAI, show me I'm wrong
.@UIDAI shame on you, you don't even have the level for a school project
My #Indian friends, good luck, these guys have no idea of what they are doing...
The developer section of the "NewTest" app refers to wferr.com. @rrefw you have a very good description on your #github
"A pretty bad coder. I try my best though. I need to test stuff before I push. ,-,"
unroll
• • •
Missing some Tweet in this thread? You can try to
force a refresh
First thing first, we are talking about this app "Bolo Messenger - Secure Chat, Voice & Video Calls" which is the new version of the #Kimbho app play.google.com/store/apps/det…
When you send a message with the #Bolo app, it is checking if your contact is online with this request. The endpoint is taking the "contact userId" (the 1st black rectangle in the picture)
Time for a new thread. The #android#application called @moinsbete is one of the most downloaded applications in France. This app is sending without your consent your personal data to @mopub:
- location
- operator
- mcc
- mnc
- country
- screen size
Yes, all these requests to @mopub are HTTP requests... Welcome to 2018...
This is a very good example of data abuse. Every time you open the @moinsbete#android#app with location on, your location is send without your consent to an US based server owned by @mopub
The samples are available on @koodous_project and @virusbay_io
28c69801929f0472cef346880a295cdf4956023cd3d72a1b6e72238f5b033aca
679d6ad1dd6d1078300e24cf5dbd17efea1141b0a619ff08b6cc8ff94cfbb27e
990d278761f87274a427b348f09475f5da4f924aa80023bf8d2320d981fb3209