3
edits
| Line 79: | Line 79: | ||
* Web Apps must be installed to gain permissions (ie websites on the same domain as a web app will not get the same permissions) | * Web Apps must be installed to gain permissions (ie websites on the same domain as a web app will not get the same permissions) | ||
* Trusted UI | * Trusted UI | ||
=== Privacy-invasive but non-malicious app === | |||
An application wants information about the user that the user is not comfortable sharing with the app. The application is not outright malicious; it follows FTC guidelines (e.g., it has a privacy policy). However, the user might not like what the app will do with his/her data. Some examples might be: | |||
* An app tags posts with your current location | |||
* An app turns the camera on for an optional chatting feature | |||
* An app collects contact lists for marketing purposes | |||
====Potential Countermeasures==== | |||
* Several of the countermeasures for the malicious web app case also apply here | |||
* Contracts between web sites/apps and the stores that distribute them | |||
edits