{"id":1841,"date":"2016-08-19T11:56:59","date_gmt":"2016-08-19T08:56:59","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1841"},"modified":"2019-06-10T17:02:26","modified_gmt":"2019-06-10T14:02:26","slug":"pokemon-go","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/pokemon-go\/","title":{"rendered":"The Risks and Perils of Pokemon GO"},"content":{"rendered":"\n<p>This summer it seems the world has gone crazy over Pokemon. The characters who first gained fame in the animated series from the&nbsp;early 2000s have returned triumphantly and are again earning millions &#8211; now in the form of the game <em>Pokemon GO<\/em>. Its popularity is such that even serious IT-themed internet publications are writing articles about the rules of the game and advice about how to download and install it in countries where the app is not officially released yet.<\/p>\n\n\n\n<p>However, the game has drawn more than just praise. Even though it is a very recent phenomenon, the app has already caused several incidents. In some, it has played the role of victim, and in others, that of villain.<\/p>\n\n\n\n<p>For example, on <em>Google Play<\/em> there have been three viruses masquerading as <em>Pokemon GO<\/em>. Of particular concern was one called \u201c<em>Pokemon GO Ultimate<\/em>\u201d. This \u201capp\u201d from hackers promised access to the game in countries where it had yet to be officially released, but then completely paralyzed smartphones, frequently without the possibility to reboot them. Even after hard reboots, the virus would continue to work in the background. It would also redirect browser traffic to pornographic websites.<\/p>\n\n\n\n<p>Two more pieces of malware displayed ads on the screens of the affected devices&nbsp;or threatened the owners of the smartphones into signing up for paid services.<\/p>\n\n\n\n<p>The offending apps were detected and removed from the store, but a large number (more than 50 thousand) of users managed to download the app before that and infect their gadgets. And this happened in the official <em>Google<\/em> play store! Imagine what is taking place in less regulated app repositories, where there are practically no checks on the available programs.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/08\/pikachu-pokemon-go-2.jpeg\" alt=\"Is Pokemon GO secure?\" class=\"wp-image-4730\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/08\/pikachu-pokemon-go-2.jpeg 800w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/08\/pikachu-pokemon-go-2-300x169.jpeg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/08\/pikachu-pokemon-go-2-768x432.jpeg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/08\/pikachu-pokemon-go-2-610x343.jpeg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>It turns out that these are not the only problems one can encounter after downloading <em>Pokemon GO<\/em>. Widely circulated posts worry about the game\u2019s capability to spy on gamers and pass their personal data on to third parties. Few apps have drawn so much criticism for violating the confidentiality of their users. Some talk of the dirty PR tactics of the company (to attract interest in its product), others hint about a conspiracy of the \u201chidden world\u201d or about the direct participation of the surveillance state in making the game. Whether or not to believe these extreme versions is a private choice. However, there is a perfectly official source that makes it possible to find out exactly which information is being collected. On the website of the company Niantic in the section dedicated to <em>Pokemon GO<\/em>, one can find the publicly-available confidentiality policy. It\u2019s a shame that people rarely read the EULA &#8211; such agreements are not always as boring and useless as they seem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let\u2019s Refer to the Source<\/h2>\n\n\n\n<p>Writing this article, we used the most recently published <em>Pokemon GO<\/em> confidentiality policy. We provide here a short summary of the contents of this document:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>To register for the game, in addition to going directly through the service, you can use a <em>Facebook<\/em> or <em>Google<\/em> account. All users will need to provide an email address. You also need to provide your age and a name (not necessarily your real one). For children 13 years and younger, the permission of a parent or guardian is required in order to register for the game. If a child is discovered to have made an account without parental consent then the account is to be deleted.<\/li><li>The provider\u2019s services may record not only the IP address, browser type, and operating system of the user, but also any websites visited prior to opening the app. It also records the time you\u2019ve spent on these websites and links you may have followed from them. Even in the event of closing or deleting your account, some information stays with the company. All private messages exchanged with other players also belong to the company. They claim that your data is all the same secured, and the private identity of the user will not be made public. The collected data is planned for use only in targeted advertising, demographic profiling, and for the betterment of the service.<\/li><li>Another term is cookies, which allow tracking the entire history of the interface between the game and the app. Some of them are not deleted after the end of the session. Third parties (for example, advertisers) can also install cookies on the user\u2019s hard disk.<\/li><li>The game\u2019s design, based as it is on virtual reality, makes it necessary to track the exact location of the user &#8211; after all, Pokemon appear near the user. The game does not allow the user to stop geolocation. However, in addition to the game developer, geographic information becomes available to other gamers. If the user tries to stop geolocation services, then almost all functions of the game cease to work (and the game loses its point).<\/li><li>The company <em>Niantic<\/em>, which created <em>Pokemon GO<\/em>, shall upon request immediately transfer any information to the authorities. This could be caused by subpoena, the protection of the company\u2019s rights and properties, the rights or security of third parties or society in general, or by any evidence of illegal behavior. The company assumes the right to determine the boundaries of these concepts.<\/li><\/ul>\n\n\n\n<p>With \u201cconfidentiality\u201d like this, one could immediately give up on any means of securing privacy online: secure messengers, two-factor authentication, and the like. This seems a little strange against the background of a tendency towards securing private data. On top of which, many other leading companies in the IT sphere throughout the world support the right of users to secure private data.<\/p>\n\n\n\n<p>Last winter\u2019s conflict between the <em>FBI<\/em> and <em>Apple<\/em>, when security services were refused access to the smartphone data of a suspected terrorist, was highly revealing. <em>Apple<\/em> wasn\u2019t trying to protect criminals, but instead trying to consistently enforce their company policy, in which is enshrined the notion of securing user data without any exceptions. If they were to deviate from this policy even once, then there would be no guarantee that the data of law-abiding citizens would also be protected from the government. Apple was able to defend its position in court, and the <em>FBI<\/em> was forced to turn to hackers to crack the <em>iPhone<\/em>. The principled position of the Cupertino company inspired many others: one direct result was <em>WhatsApp<\/em>\u2019s decision to implement end-to-end encryption (one of this idea\u2019s creators called Tim Cook his hero).<\/p>\n\n\n\n<p>Is it worthwhile to prohibit <em>Pokemon GO<\/em>, as is demanded in some countries? Any limitations would only give it the allure of being forbidden. It would almost certainly be more productive for every user to individually weigh the pros and cons of such loose data protection and then decide for themselves whether or not to play. This is what is called \u201cfree choice\u201d, and that is something that we all want to have.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>This summer it seems the world has gone crazy over Pokemon. The characters who first gained fame in the animated series from the&nbsp;early 2000s have returned triumphantly and are again earning millions &#8211; now in the form of the game Pokemon GO. Its popularity is such that even serious IT-themed internet publications are writing articles [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":4342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[202,118,230],"class_list":["post-1841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-cybersecurity","tag-data-protection","tag-information-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1841"}],"version-history":[{"count":7,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1841\/revisions"}],"predecessor-version":[{"id":4739,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1841\/revisions\/4739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4342"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}