M6 29 articles

M6: Inadequate Privacy Controls (2024)

OWASP Risk Analysis

Excessive data collection, missing consent mechanisms, and PII leakage. Apps expose personal data through logs, analytics, or insecure storage.

Risk Assessment

Threat Agents
Privacy controls protect Personally Identifiable Information (PII) such as names, addresses, credit card information, email, IP addresses, health data, religious beliefs, sexuality, and political opinions. Attackers target this data to impersonate victims, misuse payment information, blackmail users, or destroy critical information.
Attack Vectors
Exploitability AVERAGE
PII sources include app sandboxes, network communications, logs, and backups (well-protected); URL query parameters and clipboard content (moderately protected). Attackers typically breach security at other levels first through network eavesdropping, file system access, clipboard access, log inspection, or device backup analysis.
Security Weakness
Prevalence COMMON Detectability EASY
Almost all apps process PII, with many collecting more than necessary. Careless developer handling increases vulnerability risk. An app is vulnerable to privacy infringements if personal data it collects motivates an attacker to manipulate or abuse that data through insufficiently secured channels.
Technical Impact
Impact LOW
Privacy violations create minimal technical system impact unless PII includes authentication data affecting traceability. Data manipulation may render systems unusable for affected users and potentially disturb backends lacking proper sanitization.
Business Impact
Impact SEVERE
Violation of legal regulations (GDPR, CCPA, PDPA, PIPEDA, LGPD) with corporate sanctions. Financial damage from lawsuits. Reputational damage and reduced sales/usage. Loss or theft of PII enabling social engineering attacks.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles

Swiggy Sep 20, 2022

Consent Matters

Google Feb 25, 2021

Low-Power Sleep Tracking on Android

Grab Dec 23, 2025

Demystifying user journeys: Revolutionizing troubleshooting with auto tracking

Posts on Medium Nov 24, 2025

Core/Core-Impl Pattern: Build-Performance Superpower of DI & Gradle

Google Nov 20, 2025

Raising the bar on battery performance: excessive partial wake locks

Kamil Buczel Oct 15, 2025

Advanced NavigationStack Patterns in SwiftUI

Android Developers Blog Sep 1, 2025

Optimize your app battery using Android vitals wake lock metric

Swiggy Sep 19, 2023

Making Swiggy's Order Tracking a Magical Experience

Sentry Apr 21, 2023

How We Built User Interaction Tracking For Jetpack Compose

Getir Feb 15, 2023

MVI Architecture Pattern in Android

AirAsia MOVE Sep 19, 2022

Android Network Traffic Tracking and Monitoring

Freeletics Jun 22, 2020

iOS Data Tracking with CoreData

Badoo Dec 5, 2017

Singleton Service Locator Pattern and Testing in iOS

Meta Oct 30, 2017

Battery Instrumentation at Facebook

BlaBlaCar Sep 27, 2017

RxSwift MVVM Architecture Pattern

Bumble Dec 12, 2016

iOS Location Tracking Implementation

Swift.org Blog Mar 6, 2026

Building Privacy-First Analytics with Swift

Qantas Nov 24, 2025

Mobile App Release Challenges: Why Code Persistence Matters

Callstack Mar 20, 2025

Why Knowing Your App's Bundle Contents Matters for React Native Performance

Pinhome Jan 16, 2023

Flutter MVVM Pattern and Provider State Management

Expedia Sep 20, 2022

Async/Await in Swift: Modern Concurrency Patterns

Mercado Libre Jun 7, 2022

Why Mobile Apps Performance Matters

Glovo Sep 20, 2021

Swift Code Linting and Formatting Best Practices

Shopify Sep 9, 2020

Tophatting React Native

Farfetch Jul 16, 2020

App Size Matters II

Farfetch Jul 16, 2020

App Size Matters I

Zalando Jun 11, 2018

Loading Time Matters

Rakuten Viki Jan 13, 2018

Optimise Because Performance Matters

Allegro Mar 2, 2016

Integrating Android Projects with Codecov for Coverage Tracking