way of life faced a privateness fluttering when it was revealed that the company was uploading users ’ reference book data to its server without license . While it quit doing that and delete all the datum it had stored , a larger issue remains .
As Dustin Curtis annotation , computer address book of account data mining is a uncouth practice among some developer , and it ’s something Apple could control and could have even prevented in the first billet . This mail primitively appeared on Curtis ’ weblog . We suppose it was an crucial read , and he was kind enough to allow us to republish it below .
Stealing Your Address Book
It ’s not really a secret , per se , but there ’s a subdued understanding among many iOS app developers that it is satisfactory to send a user ’s entire address book , without their permission , to remote servers and then stash away it for succeeding reference . It ’s vulgar exercise , and many companies in all probability have your address book stored in their database . manifestly , there are slew of awing thing apps can do with this data to vastly improve user experience . But it is also a breach of trust and an invasion of secrecy .
I did a agile survey of 15 developer of popular iOS apps , and 13 of them told me they have a impinging database with millons of record book . One companionship ’s database has Mark Zuckerberg ’s jail cell earphone number , Larry Ellison ’s home sound turn and Bill Gates ’ electric cell phone number . This datum is not meant to be public , and people have an expectation of privateness with respect to their contact .
There are two major interrogation to require about this demeanor :

First , why does Apple allow iOS apps to access a user ’s entire speech Holy Writ , at any time , without permission ? Even Android need that apps ask for denotative permission to get at local contact . On iOS , every other seemingly private local data point source , like location and the camera roll , have strong protections ; apps ca n’t even see photos in the Camera Roll unless the exploiter explicitly selects them from the image picker . There is a vast section of the options app dedicated to leave people hunky-dory control over which apps have access to placement information . That Apple provides no protections on the Address Book is , at best , perplexing .
Second , why do app developer , who know of the potential public repercussion if this behavior were advertize ( that ’s why they keep it quiet ) , continue to upload user address books to their servers ? I think this query is easier to suffice . Any app is an investment , and , like any investing , there are three outcomes — success , loser , and mediocrity . The only one that matters on a marketplace like the App Store is winner , so fledgling app developer do everything they can to increase their chances . Because Apple allow for extremely light access to address book data , the professional — that is , using the datum to improve user experience , increase virality and growth , etc . — outweighs the convict . To stay on equal footing , larger apps , like Yelp , Facebook , and Foursquare , have to abide by along . From a design perspective , it is a concession of user growth at the disbursal of user trust .
Yesterday , it was revealed that the private social meshwork app Path practice this conduct . People were incensed . Today , CEO Dave Morinapologized on the Path web log :

Through the feedback we ’ve encounter from all of you , we now understand that the direction we had design our ‘ Add Friends ’ feature film was wrong . We are deep dark if you were uncomfortable with how our program used your earphone contact lens .
There was similar indignation last year , when Kik was outed . But , after a while , things calmed down . Kik never conceded . Developers continued to remain placid . exploiter forgot about it entirely .
Apple’s Failure
I fully believe this issue is a failure of Apple and a breach of combine by Apple , not by app developer . The expectation of Address Book privacy is obvious ; in fact , one personon Hacker News , in answer to get a line about Path ’s utilization of the data , say , “ Apple would never do this to their users . ” Because Apple has your trust and yet gives this secret information freely to developers , Apple does do this to their user . All of them .
unremarkably , when I am rummy about something Apple has done , I endeavor to empathize the design thinking that went into the decision . In this case , I ca n’t cerebrate of a intellectual reason for why Apple has not place any protections on Address Book in iOS . It makes no sense . It is a breach of my privacy , and it has allowed every app I ’ve installed to steal my address book .
More Stories from Dustin Curtis :

Ron Johnson ’s JC Penney
Honeywell Files Lawsuit Alleging Patent Infringement by Nest Labs
The person of a “ consumer electronics entertainment plug into scenario ”

Dustin Curtis is a superhero . You should follow him on Twitterhereand read his bloghere .
Applepath
Daily Newsletter
Get the good technical school , skill , and culture news in your inbox daily .
News from the future , bear to your present .
You May Also Like










![]()
