Popular beauty app Meitu checks if iPhone is jailbroken, sends carrier data back to Chinese developer

article thumbnail

AppleInsider is supported by its audience and may earn commission as an Amazon Associate and affiliate partner on qualifying purchases. These affiliate partnerships do not influence our editorial content.

One of the App Store's top downloads — an app for creating Anime-style self portraits — is a potential privacy risk to its users, as researchers have discovered the app sends details about carrier, and whether the iPhone has been jailbroken, back to the developer.

Meitu, from Chinese developer Xiamen Meitu Technology, is a "beautification" app that applies filters to self-portraits, with it recently used to create anime-style makeovers of photographs. The sudden popularity of the trend has propelled the app up the App Store rankings, reaching 13th place in the free apps chart as of Friday morning.

Security researchers have examined the iOS app and found some unusual elements, with Jonathan Zdziarski discovering it performs a number of checks to work out if the iPhone is jailbroken. The app also collects information about the cellular service used by the iPhone, and creates a unique device identifier based on part of its MAC address.

The collected data, sent back to the developer, is speculated to be sold to marketing agencies to target advertising to the user.

The iOS version of the app is not alone in having questionable security practices, as the Android version in the Google Play store apparently has its own privacy issues. A a considerable number of permissions are requested at installation, including access to the device's GPS, phone, audio settings, and the ability to run the app at the phone's startup.

Meitu says it collects user data through questionable methods because traditional tracking services are blocked in its native country of China.

Zdziarski's investigation into the code used for the iOS app uncovered the use of "forbidden App Store code" to dynamically load frameworks and use undocumented APIs. Another section uses code pulled directly from Erica Sadun's iPhoen Developer's Cookbook, which Zdziarski claims is not permitted in the App Store.

"Meitu is a throw-together of multiple analytics and marketing/ad tracking packages, with something cute to get people to use it," suggests Zdziarski. "If you like being the target of marketing and big data, by all means run Meitu. I'm sure whoever's buying their data will thank you."

In response to the claims, Meitu advised CNET it collected the data because it is based in China, and tracking services provided by the App Store and Google Play are blocked in the country. For the iOS app, the carrier information is apparently used for geo-based features and targeted advertising.

The Jailbreak detection code is claimed to have come from a software development kit supplied from WeChat, another Chinese service, which it uses to share photographs.

While the app's questionable approach to user privacy may be legitimized as a workaround to China's tight restrictions, users should still be aware of the security risks associated with overreaching apps, as there is no guarantee that the data will only be used for marketing purposes.