FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

Total Page:16

File Type:pdf, Size:1020Kb

FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic Thijs van Ede1, Riccardo Bortolameotti2, Andrea Continella3, Jingjing Ren4, Daniel J. Dubois4, Martina Lindorfer5, David Choffnes4, Maarten van Steen1, and Andreas Peter1 1University of Twente, 2Bitdefender, 3UC Santa Barbara, 4Northeastern University, 5TU Wien ft.s.vanede, m.r.vansteen, [email protected], [email protected], facontinella, [email protected], frenjj, d.dubois, [email protected] Abstract—Mobile-application fingerprinting of network traffic However, recognizing mobile apps can be a double-edged is valuable for many security solutions as it provides insights into sword: On the one hand, network flow analysis provides a non- the apps active on a network. Unfortunately, existing techniques intrusive central view of apps on the network without requiring require prior knowledge of apps to be able to recognize them. host access. On the other hand, app detection can be used for However, mobile environments are constantly evolving, i.e., apps censoring and invades users’ privacy. As we show in this work, are regularly installed, updated, and uninstalled. Therefore, it is active apps on a network can not only be reliably fingerprinted infeasible for existing fingerprinting approaches to cover all apps that may appear on a network. Moreover, most mobile traffic is for security purposes, but also in an adversarial setting, despite encrypted, shows similarities with other apps, e.g., due to common traffic encryption. Thus, privacy-conscious users need to be libraries or the use of content delivery networks, and depends on aware of the amount of information that encrypted traffic is still user input, further complicating the fingerprinting process. revealing about their app usage, and should consider additional safeguards, such as VPNs, in certain settings. As a solution, we propose FLOWPRINT, a semi-supervised approach for fingerprinting mobile apps from (encrypted) net- The idea of network-based app detection has already been work traffic. We automatically find temporal correlations among destination-related features of network traffic and use these extensively explored in both industry and academia [2, 4, 5, correlations to generate app fingerprints. Our approach is able 17, 25]. Snort for example offers AppID [21], a system for to fingerprint previously unseen apps, something that existing creating network intrusion detection rules for specified apps, techniques fail to achieve. We evaluate our approach for both while Andromaly [57] attempts to detect unknown software Android and iOS in the setting of app recognition, where we through anomaly detection by comparing its network behavior achieve an accuracy of 89.2%, significantly outperforming state- to that of known apps. Other approaches specifically focus of-the-art solutions. In addition, we show that our approach can on detecting apps containing known vulnerabilities [62], and detect previously unseen apps with a precision of 93.5%, detecting others identify devices across networks based on the list of 72.3% of apps within the first five minutes of communication. apps installed on a device [61]. All these approaches have in common that they require prior knowledge of apps before I. INTRODUCTION being able to distinguish them. However, new apps are easily Security solutions aim at preventing potentially harmful or installed, updated and uninstalled, with almost 2.5 million vulnerable applications from damaging the IT infrastructure or apps to choose from in the Google Play Store alone [60], leaking confidential information. In large enterprise networks, not to mention a number of alternative markets. Furthermore, this is traditionally achieved by installing monitoring agents recent work has shown that even the set of pre-installed apps that protect each individual device [67]. However, for mobile on Android varies greatly per device [30]. Thus, especially devices security operators do not have direct control over the when companies adopt BYOD policies, it is infeasible to know apps installed on each device in their infrastructure, especially in advance which apps will appear on the network. As a when new devices enter networks under bring-your-own-device consequence, unknown apps are either misclassified or bundled (BYOD) policies on a regular basis and with the ease by into a big class of unknown apps. In a real-world setting, a which apps are installed, updated, and uninstalled. In order security operator would need to inspect the unknown traffic to still retain detection capabilities for apps that are active in and decide which app it belongs to, limiting the applicability the network, operators rely on observing the network traffic of existing approaches in practice. of mobile devices. This naturally introduces the challenge of detecting apps in encrypted network traffic, which represents Unlike existing solutions, we assume no prior knowledge the majority of mobile traffic—80% of all Android apps, and about the apps running in the network. We aim at generating 90% of apps targeting Android 9 or higher, adopt Transport fingerprints that act as markers, and that can be used to both Layer Security (TLS) [31]. recognize known apps and automatically detect and isolate previously unseen apps. From this, a security operator can update whitelists, blacklists or conduct targeted investigations on per-app groupings of network traffic. Network and Distributed Systems Security (NDSS) Symposium 2020 23-26 February 2020, San Diego, CA, USA ISBN 1-891562-61-4 There are several challenges that make such fingerprinting https://dx.doi.org/10.14722/ndss.2020.24412 non-trivial. This is because mobile network traffic is particu- www.ndss-symposium.org larly homogeneous, highly dynamic, and constantly evolving: Homogeneous. Mobile network traffic is homogeneous be- example, having knowledge about the Google Maps app, cause many apps share common libraries for authentication, allows us to rename unknown_app_X to google_maps. advertisements or analytics [11]. In addition, the vast majority Similarly, unseen app detection requires a training phase on a of traffic uses the same application-level protocol HTTP in set of known apps to identify unknown ones. various forms (HTTP(S)/QUIC) [50]. Furthermore, part of the content is often served through content delivery networks In summary, we make the following contributions: (CDNs) or hosted by cloud providers. Consequently, different • We introduce an approach for semi-supervised fin- apps share many network traffic characteristics. Our work gerprinting by combining destination-based clustering, tackles homogeneous traffic by leveraging the difference in browser isolation and pattern recognition. network destinations that apps communicate with. We show that despite the large overlap in destinations, our approach is • We implement this approach in our prototype FLOW- still able to extract unique patterns in the network traffic. PRINT, the first real-time system for constructing mobile app fingerprints capable of dealing with unseen Dynamic. Mobile network traffic is often dynamic as data that apps, without requiring prior knowledge. apps generate may depend on the behavior of the users, e.g., • We show that, for both Android and iOS apps, our their navigation through an app. Such dynamism may already approach detects known apps with an accuracy of be observed in synthetic datasets that randomly browse through 89.2%, significantly outperforming the state-of-the-art an app’s functionality. Various fingerprinting approaches rely supervised app recognition system AppScanner [62]. on repetitive behavior in network traffic [1, 28]. Despite good Moreover, our approach is able to deal with app results of these methods in smart-home environments and updates and is capable of detecting previously unseen industrial control systems, dynamic traffic could complicate apps with a precision of 93.5%. fingerprinting of mobile apps. Hence, our work aims to create fingerprints that are robust against user interactions by leverag- In the spirit of open science, we make both our prototype and ing information about network destinations on which the user datasets available at https://github.com/Thijsvanede/FlowPrint. has limited influence. We show that our approach achieves similar results on both automated and user-generated datasets. II. PRELIMINARY ANALYSIS Evolving. Mobile network traffic is constantly evolving as app To study mobile network traffic and identify strong indica- markets offer effortless installation, update, and uninstallation tors that can be used to recognize mobile apps, we performed of a vast array of apps. Studies have shown that apps are a preliminary analysis on a small dataset. As indicated in regularly updated with new versions, as frequently as once a the introduction, our fingerprinting method should be able to month on average [11, 22]. This is a challenge for existing fin- distinguish mobile apps despite their homogeneous, dynamic gerprinting mechanisms that require prior knowledge of an app and evolving behavior. Hence, in our preliminary analysis we in order to generate fingerprints. When new or updated apps explored features that may be used to fingerprint apps. are introduced into the network, these fingerprinting systems become less accurate, similarly to what Vastel et al. observed in the setting of browser fingerprinting [65]. Moreover, the frac- A. Dataset tion of apps covered by these systems dramatically decreases In order to perform our analyses, we use datasets of
Recommended publications
  • Android Stop Pop up Notifications
    Android Stop Pop Up Notifications primates?Incandescent Excruciatingly Tymothy remould macho, incontestably. Artie depleting How gorgets heelless and issullying Christ fondlers.when unnavigated and sexcentenary Peter vernalised some Let us deliver better to stop pop up notifications android ecosystem, turn off notifications In this day and age, and even SMS. All Kaspersky Endpoint Security for Android notifications are enabled by default. Setup on phone, client questions, and applications. Look at the resulting lists quickly, keep in mind that you must set up everything on your browser again, or direct messages. The help desk software for IT. Sometimes more apps notifications are irritating you also. Execute a function as a callback once GDPR consent is granted. How to marital and enable Firefox notifications on Windows Android MacOS iOS Browser settings and main steps to block pop ups. Under settings in touch with the information. Make sure all the GA dimensions are setup and correct VAN. Fret not, click the Gear icon that is the settings for Messenger. If you frequently encounter this situation, I am responding to business, where he specializes in Android OS and Google products. Cannot get workspaces info. What does device protection mean? LINE user with that phone number registered. Segment snippet included twice. Go through the list and enable any apps you want to be able to view and interact with from notifications on screen. Get instant access to breaking news, personalization, or some mode of interaction. These settings apply to all chats by default, you can just block the site sending the notifications, copy and paste this URL into your RSS reader.
    [Show full text]
  • Browsers and Their Use in Smart Devices
    TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Alina Kogai 179247IACB Browsers and their use in smart devices Bachelor’s thesis Supervisor: Vladimir Viies Associate Professor Tallinn 2020 TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Alina Kogai 179247IACB Brauserid ja nende kasutamine nutiseadmetes Bakalaureusetöö Juhendaja: Vladimir Viies Dotsent Tallinn 2020 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Alina Kogai 30.11.2020 3 BAKALAUREUSETÖÖ ÜLESANDEPÜSTITUS Kuupäev: 23.09.2020 Üliõpilase ees- ja perekonnanimi: Alina Kogai Üliõpilaskood: 179247IACB Lõputöö teema: Brauserid ja nende kasutamine nutiseadmetes Juhendaja: Vladimir Viies Kaasjuhendaja: Lahendatavad küsimused ning lähtetingimused: Populaarsemate brauserite analüüs. Analüüs arvestada: mälu kasutus, kiirus turvalisus ja privaatsus, brauserite lisad. Valja toodate brauseri valiku kriteeriumid ja soovitused. Lõpetaja allkiri (digitaalselt allkirjastatud) 4 Abstract The aim of this bachelor's thesis is to give recommendations on which web browser is best suited for different user groups on different platforms. The thesis presents a methodology for evaluating browsers which are available on all platforms based on certain criteria. Tests on PC, mobile and tablet were performed for methodology demonstration. To evaluate the importance of the criteria a survey was conducted. The results are used to make recommendations to Internet user groups on the selection of the most suitable browser for different platforms. This thesis is written in English and is 43 pages long, including 5 chapters, 20 figures and 18 tables. 5 Annotatsioon Brauserid ja nende kasutamine nutiseadmetes Selle bakalaureuse töö eesmärk on anda nõuandeid selle kohta, milline veebibrauser erinevatel platvormitel sobib erinevate kasutajagruppide jaoks kõige parem.
    [Show full text]
  • SAMSUNG Galaxy S20 5G I S20 5G~ Galaxy S20+ 5G Galaxy S20 Ultra 5G
    SAMSUNG Galaxy S20 5G I S20 5G~ Galaxy S20+ 5G Galaxy S20 Ultra 5G User manual Contents Features Mobile continuity | Bixby | Biometric security | Dark mode Getting started Device layout: Galaxy S20 5G | Galaxy S20 5G UW | Galaxy S20+ 5G | Galaxy S20 Ultra 5G Set up your device: Charge the battery | Wireless power sharing Start using your device: Turn on your device | Use the Setup Wizard | Transfer data from an old device | Lock or unlock your device | Side key settings | Accounts | Set up voicemail | Navigation | Navigation bar | Customize your home screen | Bixby | Digital wellbeing and parental controls | Always On Display | Biometric security | Mobile continuity | Multi window | Edge panels | Enter text | Emergency mode Customize your home screen: App icons | Wallpaper | Themes | Icons | Widgets | Home screen settings | Easy mode | Status bar | Notification panel Camera and Gallery Camera: Navigate the camera screen | Configure shooting mode | AR Zone | Live focus | Scene optimizer | Single take | Record videos | Live focus video | Zoom-in mic | Camera settings Gallery: View pictures | Edit pictures | Play video | Video enhancer | Edit video | Share pictures and videos | Delete pictures and videos | Group similar images | Take a screenshot | Screen recorder Mobile continuity Link to Windows | Samsung DeX 2 VZW_G981U_G986U_G988U_EN_UM_TN_TKE_010421_FINAL Contents Samsung apps Galaxy Essentials | AR Zone | Bixby | Galaxy Store | Galaxy Wearable | Game Launcher | Samsung Global Goals | SmartThings | Tips | Calculator | Calendar | Clock
    [Show full text]
  • HOLA Lite Setup
    HOLA Lite setup HOLA Lite is a mobile web app that can be used to access HOLA on both (iOS & Android) mobile operating systems. HOLA Lite requires modern browser to be installed on your mobile device. Below are examples on how to easily place HOLA Lite start icon on your phone/tablet home screen. • Google Chrome (on Android) – automatic • Google Chrome (on Android) – manual • Firefox (on Android) - manual • Samsung Internet browser (on Android) - manual • Xiaomi browser (on Android) – automatic • Xiaomi browser (on Android) – manual • UC browser (on Android) - manual • Safari (on iOS) - manual Note: HOLA Lite must be served via secure https connection for home screen launcher to work correctly. www.deyatech.com | [email protected] | Tel: +86 10 6501 3753 www.deyatech.com | [email protected] | Tel: +86 400 082 6608 Google Chrome (on Android) - automatic 1 2 3 4 www.deyatech.com | [email protected] | Tel: +86 10 6501 3753 Open browser, type in hostname or After the site loads, pop-up window Add to Home screen pop-up shows This will add HOLA Lite web app to IP address of your HOLA Lite and hit shows up. Click “Add Lite to Home up. Click ADD button. your home screen. Enter. screen” button. www.deyatech.com | [email protected] | Tel: +86 400 082 6608 Google Chrome (on Android) - manual 1 2 3 4 www.deyatech.com | [email protected] | Tel: +86 10 6501 3753 Open browser, type in hostname or In options, select Add to Home Add to Home screen pop-up shows This will add HOLA Lite web app to IP address of your HOLA Lite and hit screen option.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • General Knowledge Objective Quiz
    Brilliant Public School , Sitamarhi General Knowledge Objective Quiz Session : 2012-13 Rajopatti,Dumra Road,Sitamarhi(Bihar),Pin-843301 Ph.06226-252314,Mobile:9431636758 BRILLIANT PUBLIC SCHOOL,SITAMARHI General Knowledge Objective Quiz SESSION:2012-13 Current Affairs Physics History Art and Culture Science and Technology Chemistry Indian Constitution Agriculture Games and Sports Biology Geography Marketing Aptitude Computer Commerce and Industries Political Science Miscellaneous Current Affairs Q. Out of the following artists, who has written the book "The Science of Bharat Natyam"? 1 Geeta Chandran 2 Raja Reddy 3 Saroja Vaidyanathan 4 Yamini Krishnamurthy Q. Cricket team of which of the following countries has not got the status of "Test" 1 Kenya 2 England 3 Bangladesh 4 Zimbabwe Q. The first Secretary General of the United Nation was 1 Dag Hammarskjoeld 2 U. Thant 3 Dr. Kurt Waldheim 4 Trygve Lie Q. Who has written "Two Lives"? 1 Kiran Desai 2 Khushwant Singh 3 Vikram Seth 4 Amitabh Gosh Q. The Headquarters of World Bank is situated at 1 New York 2 Manila 3 Washington D. C. 4 Geneva Q. Green Revolution in India is also known as 1 Seed, Fertiliser and irrigation revolution 2 Agricultural Revolution 3 Food Security Revolution 4 Multi Crop Revolution Q. The announcement by the Nuclear Power Corporation of India Limited Chairmen that India is ready to sell Pressurised 1 54th Conference 2 53rd Conference 3 51st Conference 4 50th Conference Q. A pension scheme for workers in the unorganized sector, launched recently by the Union Finance Ministry, has been named 1 Adhaar 2 Avalamb 3 Swavalamban 4 Prayas Q.
    [Show full text]
  • Dolphin Browser Request Desktop Site
    Dolphin Browser Request Desktop Site Glossy Parry decays his antioxidants chorus oversea. Macrobiotic Ajai usually phenomenalizing some kinos or reek supinely. Felicific Ramsay sequesters very sagittally while Titos remains pyogenic and dumbstruck. You keep also half the slaughter area manually, by tapping on the screen. You can customize your cookie settings below. En WordPresscom Forums Themes Site by link doesn't work on. Fixed error message in Sync setup sequence. The user agent is this request header a grade of metadata sent west a browser that. Dolphin For Android Switch To stock Or Mobile Version Of. Fixed browser site is set a clean browser? 4 Ways to turning a Bookmark Shortcut in contemporary Home Screen on. What gear I say? Google Chorme for Android offers this otherwise known as Request that site. The desktop version of gps in every data, its advanced feature. It is dolphin browser desktop sites from passcards and loaded. Tap on account settings screen shot, dropbox support the best android browser desktop site design of ziff davis, gecko include uix. But, bush too weary a premium service. Store only hash of potato, not the property itself. Not constant is Dolphin Browser a great web browser it also needs a niche few. Download Dolphin Browser for PC with Windows XP. Dolphin browser Desktop Mode DroidForumsnet Android. For requesting the site, which you use is not, identity and telling dolphin sidebar function to manage distractions and instapaper sharing menu. Note If for desktop version of iCloudcom doesn't load up re-type wwwicloudcom in the address bar. This already horrible ergonomics.
    [Show full text]
  • Make Any Place Your Workplace with Samsung Dex and Vmware Workspace ONE Derived Credential VDI Sessions
    Mobile Authentication Using Samsung DeX for Government Make any place your workplace with Samsung DeX and VMware Workspace ONE derived credential VDI sessions. Department of Defense (DoD) and Federal civilian personnel can achieve derived credential-authenticated access to the VMware Samsung DeX and VMware Workspace ONE platform and Horizon virtual desktop using the latest Samsung Galaxy smartphones and tablets and Samsung DeX. Forget your laptop. On purpose. Connect the latest Galaxy smartphones with Samsung DeX to a monitor, 1 With just a single cable or HDMI adapter, you can enable your Galaxy keyboard and mouse, to work anywhere in an optimized desktop Note10 | 10+ | 10+ 5G, Galaxy S10e | S10 | S10+, Galaxy S9 | S9+, Galaxy experience for Android apps.2,3 All without having to transfer data or files Note9 or Galaxy Tab S4, Tab S5e, Tab S6 to power Samsung DeX, and to a separate computer. run an entire desktop complete with a computer monitor, keyboard and Authenticate with derived credentials. mouse.2 You’ll have a desktop experience to open apps, use keyboard Use derived credentials to achieve an authenticated remote connection shortcuts and drag and drop files, all on a big screen. to networks and your VMware virtualized desktop. Protect mission-critical endpoints. Samsung Galaxy smartphones and tablets work seamlessly with Samsung Knox defense-grade mobile security protects the apps and derived credentials, the VMware Workspace ONE platform, and Horizon data you access with Samsung DeX. VDI sessions3 for secure, remote access to government networks, applications and data, without a CAC or PIV card. Increase mobility. Improve efficiency.
    [Show full text]
  • Samsung Galaxy S21 5G
    User manual Contents Features S Pen | Mobile continuity | Bixby | Biometric security | Dark mode Getting started Device layout: Galaxy S21 5G | Galaxy S21+ 5G | Galaxy S21 Ultra 5G Set up your device: Charge the battery | Wireless power sharing Start using your device: Turn on your device | Use the Setup Wizard | Transfer data from an old device | Lock or unlock your device | Side key settings | Accounts | Set up voicemail | Navigation | Navigation bar | Customize your home screen | S Pen | Bixby | Digital wellbeing and parental controls | Always On Display | Biometric security | Mobile continuity | Multi window | Edge panels | Enter text | Emergency mode Customize your home screen: App icons | Wallpaper | Themes | Icons | Widgets | Home screen settings | Easy mode | Status bar | Notification panel Camera and Gallery Camera: Navigate the camera screen | Configure shooting mode | AR Zone | Scene optimizer | Single take | Space Zoom | Record videos | Director’s view | Zoom-in mic | Camera settings Gallery: View pictures | Edit pictures | Play video | Video enhancer | Edit video | Share pictures and videos | Delete pictures and videos | Group similar images | Take a screenshot | Screen recorder Mobile continuity Link to Windows | Samsung DeX | Continue apps on other devices 2 SAM_G991U_G996U_G998U_EN_UM_TN_TLF_011421_FINAL Contents Samsung apps Galaxy Essentials | AR Zone | Bixby | Galaxy Shop | Galaxy Store | Galaxy Wearable | Game Launcher | PENUP | Samsung Free | Samsung Global Goals | Samsung Members | Samsung TV Plus | SmartThings |
    [Show full text]
  • Multicare Health System Telehealth Troubleshooting Guide
    MultiCare Health System Telehealth Troubleshooting Guide MARCH 2020 Common issues with AmWell virtual visit setup We’ve compiled a list of common issues that people experience in Windows Desktop environment when setting up and using AmWell for a virtual doctor visit for the first time. If these tips do not resolve your problems please call 844-388-2356 for assistance. UNABLE TO LOG INTO MYCHART • MyChart password reset tool. • Please call MyChart Customer Support at 844-388-2356, Mon-Fri, 7am-6pm. INCOMPATIBLE OPERATING SYSTEM* If your device’s operating system is incompatible with AmWell, you will need to upgrade your operating system or try another device that does use an approved operating system. See page 4 of this document for a list of operating systems that will work with AmWell. INCOMPATIBLE BROWSER** Pre-visit hardware test will direct user to download an approved browser. MICROPHONE DISABLED/WRONG DEVICE SELECTED* 1. Search for control panel and open it. 2. Search “Sound.” 3. Select manage. 4. Select recording tab. If desired device is showing as disabled, right click and select enable. If another device is selected as default (green check is a visual indicator ) Right click desired device and select “set as default device.” SPEAKERS DISABLED/WRONG DEVICE SELECTED* 1. Search for control panel and open it. 2. Search “Sound.” 3. Select manage. 4. If desired device is showing as disabled, right click and select. 5. If desired device is showing as disabled, right click and select enable. If another device is selected as default (green check is a visual indicator ) Right click desired device and select “set as default device.” Pre-visit Hardware Test * Identifiable from within the pre-visit hardware test Hardware Test can be found here: ** Identifiable and resolvable within the pre-visit hardware test MultiCare Health System Possible Patient Issues 2 Common issues with AmWell virtual visit setup WEBCAM NOT SHOWING UP/NOT FUNCTIONING PROPERLY* 1.
    [Show full text]
  • 2016 Bile Ad
    M BILE AD BL CKING 2016 Ad blocking app installs just spiked 3x (here's what marketers need to know) EXECUTIVE SUMMARY ADVERTISING AND PRIVACY HAVE BECOME INCREASINGLY TOP-OF-MIND IN THE LAST YEAR. Recent data suggests that up to 70% of mobile users are either blocking ads or interested in blocking ads, and that a strong majority of smartphone owners are concerned about how advertisers monitor and track their digital behavior. What we’ve seen in surveying almost 4,000 smartphone owners in the U.S. and Europe confirms that interest in ad blocking and actual ad blocking on mobile is accelerating. Fast. In just the last three months, the growth rate of new users downloading and installing mobile ad blockers has more than tripled. Shockingly, if this recent accelerated growth rate of ad blocking growth were to continue, more than 80% of smartphone owners could be blocking ads by mid to late 2017. In spite of that massive growth, there is still a huge amount of confusion and uncertainty about what ad blockers do, how they operate, and whether or not they protect digital privacy in mobile environments. Consumers are confused, and so are publishers and marketers. In this report, we break down: What smartphone owners are saying Who is installing ad blockers Why smartphone owners are installing ad blockers What ad blocking does and how it works What limit ad tracking does and how it works What mobile platform players such as Google, Apple, and Facebook are doing How marketers should respond MOBILE AD BLOCKING 2016: AD BLOCKING APP INSTALLS JUST SPIKED 3X (HERE'S WHAT MARKETERS NEED TO KNOW) Executive Summary CONTENTS SHOCKING,.
    [Show full text]
  • Samsung Galaxy Tab a | Tab a Kids Edition T290 User Manual
    SI\MSUNG GalaxyTabA Tab A Kids Edition User manual Table of contents Features 1 Camera 1 Multi window 1 Night mode 1 Expandable storage 1 Getting started 2 Device layout 3 Assemble your device 4 Charge the battery 5 Install the Kids Edition bumper 6 Start using your device 6 Use the Setup Wizard 6 Lock or unlock your device 7 Accounts 8 Transfer data from an old device 9 Navigation 10 Navigation bar 15 Customize your home screen 16 i WIF_T290_EN_UM_TN_SF5_072919_FINAL Table of contents Digital wellbeing 22 Multi window 23 Enter text 24 Apps 28 Using apps 29 Uninstall or disable apps 29 Search for apps 29 Sort apps 29 Create and use folders 30 App settings 30 Samsung apps 32 Galaxy Essentials 32 Galaxy Store 32 Samsung Kids 32 Samsung Notes 33 Calculator 35 Calendar 36 Camera 38 Clock 42 ii fTable o contents Contacts 47 Email 52 Gallery 55 Internet 59 My Files 62 Google apps 64 Chrome 64 Drive 64 Duo 64 Gmail 64 Google 64 Maps 65 Photos 65 Play Movies & TV 65 Play Music 65 Play Store 65 YouTube 65 Additional apps 66 Office Mobile 66 iii Table of contents OneDrive 66 Spotify 66 Settings 67 Access Settings 68 Search for Settings 68 Connections 68 Wi-Fi 68 Bluetooth 70 Airplane mode 71 Data usage 71 Nearby device scanning 72 Connect to a printer 72 Virtual Private Networks 73 Private DNS 73 Ethernet 74 Sounds and vibration 74 Sound mode 74 Notification sounds 74 Volume 75 iv Table of contents System sounds 76 Dolby Atmos 76 Notifications 77 Manage notifications 77 Customize app notifications 77 Smart pop-up view 77 Display 78 Screen brightness
    [Show full text]