A researcher has created a free and open source tool that anybody can use to inspect what code is being injected by such browsers. The researcher did a study to discover how big corporations may track user behavior using their mobile in-app browsers.
Some mobile applications include built-in browsers that enable users to access other websites rapidly. Other applications have their own browsers that they might use to load the resources they require to carry out certain tasks. These internal browsers could potentially provide privacy and security problems, though.
This month, researcher Felix Krause claimed in a blog post that the iOS applications for Instagram and Facebook could track everything a user did on an external website they visited using the app’s built-in browser.
According to Meta, the business is injecting the code as part of an App Tracking Transparency (ATT) method to support respecting users’ privacy preferences. The keylogging code is real, according to TikTok, but it’s not being used.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.