際際滷

際際滷Share a Scribd company logo
10,000 Android Apps
5.5 k
b

eve
lo p

e rs

pp
Si
ze

1

5
0M
7051 D B A

APP
1732

Start at Device Boot

49 %
Access User
Location

9
0
1


pe
ps
Ap

ev
rD

per
elo

RAY
69 %

Unencrypted
Communication

26 %

Insecure
SSL Connection

448

Send IMEI to Server

Gl oba l Data Col l e ct i o n

D a t a s en t t o 435 8 Ser ver s w it hout User Consent
www.ap p - r ay.de
Ad

Recommended

Bluetooth & Fiat
Bluetooth & Fiat
guest09f636
Building Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero Trust
Mahesh Patil
Zco integrates columbitech mobile vpn in police pad and firetab
Zco integrates columbitech mobile vpn in police pad and firetab
Zco Corporation | Nashua, NH - Profile and Reviews
Produktschutz-Technologien f端r elektronische Ger辰te
Fraunhofer AISEC
Sicherheitsgipfel - Chancen und Risiken der IT
Fraunhofer AISEC
Cyber-Sicherheit - Newsletter 2013
Fraunhofer AISEC
Internet of (Every)Thing
Fraunhofer AISEC
Marktchancen mit IT-Sicherheit
Fraunhofer AISEC
Fraunhofer Magazin weiter.vorn
Fraunhofer AISEC
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
Fraunhofer AISEC
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
Fraunhofer AISEC
Cybersecurity 2013 - Design for Security
Fraunhofer AISEC
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
Fraunhofer AISEC
PEP - Protecting Electronic Products
Fraunhofer AISEC
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
Fraunhofer AISEC
Infografik Produktschutz
Fraunhofer AISEC
Cyber Security aus Sicht der Wissenschaft
Fraunhofer AISEC
Produktschutz Infografik
Fraunhofer AISEC
IKT-Trends und deren Bedeutung f端r eHealth
Fraunhofer AISEC
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Fraunhofer AISEC
Alan Turing
Fraunhofer AISEC
Sicherheit im Smart Grid
Fraunhofer AISEC
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
Fraunhofer AISEC
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
Fraunhofer AISEC
Sicherheit im Internet Sichere Identit辰t, sichere Dienste und Compliance
Fraunhofer AISEC
Unternehmenskommunikation aber sicher!
Fraunhofer AISEC
IT-Sicherheit: Herausforderungen f端r Wissenschaft und Gesellschaft
Fraunhofer AISEC
Landscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10

More Related Content

More from Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer AISEC
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
Fraunhofer AISEC
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
Fraunhofer AISEC
Cybersecurity 2013 - Design for Security
Fraunhofer AISEC
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
Fraunhofer AISEC
PEP - Protecting Electronic Products
Fraunhofer AISEC
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
Fraunhofer AISEC
Infografik Produktschutz
Fraunhofer AISEC
Cyber Security aus Sicht der Wissenschaft
Fraunhofer AISEC
Produktschutz Infografik
Fraunhofer AISEC
IKT-Trends und deren Bedeutung f端r eHealth
Fraunhofer AISEC
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Fraunhofer AISEC
Alan Turing
Fraunhofer AISEC
Sicherheit im Smart Grid
Fraunhofer AISEC
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
Fraunhofer AISEC
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
Fraunhofer AISEC
Sicherheit im Internet Sichere Identit辰t, sichere Dienste und Compliance
Fraunhofer AISEC
Unternehmenskommunikation aber sicher!
Fraunhofer AISEC
IT-Sicherheit: Herausforderungen f端r Wissenschaft und Gesellschaft
Fraunhofer AISEC
Landscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
Fraunhofer Magazin weiter.vorn
Fraunhofer AISEC
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
Fraunhofer AISEC
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
Fraunhofer AISEC
Cybersecurity 2013 - Design for Security
Fraunhofer AISEC
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
Fraunhofer AISEC
PEP - Protecting Electronic Products
Fraunhofer AISEC
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
Fraunhofer AISEC
Infografik Produktschutz
Fraunhofer AISEC
Cyber Security aus Sicht der Wissenschaft
Fraunhofer AISEC
Produktschutz Infografik
Fraunhofer AISEC
IKT-Trends und deren Bedeutung f端r eHealth
Fraunhofer AISEC
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Fraunhofer AISEC
Alan Turing
Fraunhofer AISEC
Sicherheit im Smart Grid
Fraunhofer AISEC
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
Fraunhofer AISEC
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
Fraunhofer AISEC
Sicherheit im Internet Sichere Identit辰t, sichere Dienste und Compliance
Fraunhofer AISEC
Unternehmenskommunikation aber sicher!
Fraunhofer AISEC
IT-Sicherheit: Herausforderungen f端r Wissenschaft und Gesellschaft
Fraunhofer AISEC
Landscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC

Recently uploaded (20)

Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Ad

App Ray: 10000 Apps

  • 1. 10,000 Android Apps 5.5 k b eve lo p e rs pp Si ze 1 5 0M 7051 D B A APP 1732 Start at Device Boot 49 % Access User Location 9 0 1 pe ps Ap ev rD per elo RAY 69 % Unencrypted Communication 26 % Insecure SSL Connection 448 Send IMEI to Server Gl oba l Data Col l e ct i o n D a t a s en t t o 435 8 Ser ver s w it hout User Consent www.ap p - r ay.de