Analysis of Privacy Protections in Fitness Tracking Social Networks
Total Page:16
File Type:pdf, Size:1020Kb
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? Wajih Ul Hassan, Saad Hussain, and Adam Bates, University Of Illinois Urbana-Champaign https://www.usenix.org/conference/usenixsecurity18/presentation/hassan This paper is included in the Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA ISBN 978-1-939133-04-5 Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? Wajih Ul Hassan∗ Saad Hussain∗ Adam Bates University of Illinois at Urbana-Champaign fwhassan3,msh5,[email protected] Abstract tracking (i.e., self-tracking [44]). These apps sync to Mobile fitness tracking apps allow users to track their a social network that provides users with the ability to workouts and share them with friends through online so- track their progress and share their fitness activities with cial networks. Although the sharing of personal data other users. The ability to share fitness activities is an es- is an inherent risk in all social networks, the dangers sential ingredient to the success of these services, moti- presented by sharing personal workouts comprised of vating users to better themselves through shared account- geospatial and health data may prove especially grave. ability with friends and even compete with one another While fitness apps offer a variety of privacy features, at via leaderboards that are maintained for popular routes. present it is unclear if these countermeasures are suffi- Although the sharing of personal data is an inherent cient to thwart a determined attacker, nor is it clear how risk in all social networks [42, 45, 48, 53, 56], there are many of these services’ users are at risk. unique risks associated with the data collected by fitness In this work, we perform a systematic analysis of apps, where users share geospatial and temporal infor- privacy behaviors and threats in fitness tracking social mation about their daily routines, health data, and lists of networks. Collecting a month-long snapshot of pub- valuable exercise equipment. While these services have lic posts of a popular fitness tracking service (21 mil- previously been credited as a source of information for lion posts, 3 million users), we observe that 16.5% of bicycle thieves (e.g., [6, 17]), the true risk of sharing this users make use of Endpoint Privacy Zones (EPZs), which data came to light in January 2018 when Strava’s global conceal fitness activity near user-designated sensitive lo- heat map was observed to reveal the precise locations of cations (e.g., home, office). We go on to develop an classified military bases, CIA rendition sites, and intel- attack against EPZs that infers users’ protected loca- ligence agencies [24]. Fitness activity is thus not only a tions from the remaining available information in pub- matter of personal privacy, but in fact is “data that most lic posts, discovering that 95.1% of moderately active intelligence agencies would literally kill to acquire” [46]. users are at risk of having their protected locations ex- In response to public criticism over the global heat tracted by an attacker. Finally, we consider the efficacy map incident, Strava has pointed to the availability of of state-of-the-art privacy mechanisms through adapting a variety of privacy protection mechanisms as a means geo-indistinguishability techniques as well as developing for users to safeguard their accounts [50] – in addition a novel EPZ fuzzing technique. The affected companies to generic privacy settings, domain-specific mechanisms have been notified of the discovered vulnerabilities and such as Endpoint Privacy Zones (EPZs) conceal fitness at the time of publication have incorporated our proposed activity that occurs within a certain distance of sensitive countermeasures into their production systems. user locations such as homes or work places [15, 16, 13]. However, at present it is unclear if such features are widely used among athletes, nor is it clear that these 1 Introduction countermeasures are adequate to prevent attackers from discovering the private locations of users. Fitness tracking applications such as Strava [23] and In this work, we perform a systematic analysis of pri- MapMyRide [1] are growing increasingly popular, pro- vacy threats in fitness tracking social networks. We begin viding users with a means of recording the routes of by surveying the fitness app market to identify classes of their cycling, running, and other activities via GPS-based privacy mechanisms. Using these insights, we then for- ∗Joint first authors. malize an attack against the Endpoint Privacy Zones fea- USENIX Association 27th USENIX Security Symposium 497 (a) Without Privacy Zone (b) With Privacy Zone Figure 1: Summary of a Strava running activity that occurred in Austin, Texas during USENIX Security 2016. Figure 1a displays the full exercise route of the athlete. Figure 1b shows the activity after an Endpoint Privacy Zone (EPZ) was retroactively added, 1 obscuring the beginning and end parts of the route that fell within 8 miles of the Hyatt Regency Austin hotel. ture. To characterize the privacy habits of users, we col- demand for privacy protections by 16.5%, motivating lect a month-long activity dataset of public posts from the need for further study in this area. Strava, an exemplar fitness tracking service. We next use this dataset to evaluate our EPZ attack, discovering • Develop Privacy Extensions. Leveraging our that 95.1% of regular Strava users are at risk of having dataset of public activity posts, we evaluate the effec- their homes and other sensitive locations exposed. We tiveness of state-of-the-art privacy enhancements (e.g., demonstrate the generality of this result by replicating geo-indistinguishability [26]) for solving problems in our attack against data collected from two other popular fitness tracking services, and develop novel protec- fitness apps, Garmin Connect and Map My Tracks. tions based on insights gained from this study. These findings demonstrate privacy risks in the state- of-the-practice for fitness apps, but do not speak to the • Vulnerability Disclosure. We have disclosed these state-of-the-art of location privacy research. In a final results to the affected fitness tracking services (Strava, series of experiments, we leverage our Strava dataset Garmin Connect, and Map My Tracks). All companies to test the effectiveness of privacy enhancements that have acknowledged the vulnerability and have incor- have been proposed in the literature [26, 27]. We first porated one or more of our proposed countermeasures evaluate the EPZ radius obfuscation proposed by [27]. into their production systems.1 Next, we adapt spatial cloaking techniques [41] for use in fitness tracking services in order to provide geo- indistinguishability [26] within the radius of the EPZ. 2 Fitness Tracking Social Networks Lastly, we use insights from our attack formalization to develop a new privacy enhancement that randomizes the Popularized by services such as Strava [23], fitness track- boundary of the EPZ in order to conceal protected lo- ing apps provide users the ability to track their outdoor cations. While user privacy can be improved by these fitness activities (e.g., running) and share those activi- techniques, our results point to an intrinsic tension that ties with friends as well as other users around the world. exists within applications seeking to share route infor- Leveraging common sensors in mobile devices, these mation and simultaneously conceal sensitive end points. services track users’ movements alongside other met- Our contributions can be summarized as follows: rics, such as the altitude of the terrain they are travers- ing. After completing a fitness activity, users receive a • Demonstrate Privacy Leakage in Fitness Apps. We detailed breakdown of their activities featuring statistics formalize and demonstrate a practical attack on the such as distance traveled. If the user pairs a fitness moni- EPZ privacy protection mechanism. We test our at- tor (e.g., Fitbit [3]) to the service, the activity can also be tack against real-world EPZ-enabled activities to de- associated with additional health metrics including heart termine that 84% of users making use of EPZs unwit- rate. Beyond publishing activities to user profiles, fit- tingly reveal their sensitive locations in public activity ness tracking services also offer the ability for users to posts. When considering only moderate and highly create and share recommended routes (segments). Each active users, the detection rate rises to 95.1%. segment is associated with a leaderboard that records the speed with which each user completed it. Most fitness tracking services also contain a social network platform • Characterize Privacy Behaviors of Fitness App Users. through which users can follow each other [12, 18, 23]. We collect and analyze 21 million activities represent- ing a month of Strava usage. We characterize demo- 1A summary of the disclosure process as well a statement on the graphic information for users and identify a significant ethical considerations of this work can be found in Section9. 498 27th USENIX Security Symposium USENIX Association Radius Private Private Block # D/Ls EPZs App Name Profiles Activities Users Sizes [min,max], inc Strava [23] 10M 3 3 3 3 [201,1005], 201 x Garmin [12] 10M 3 3 7 3 [100,1000], 100 Runtastic [22] 10M 3 7 3 7 - RunKeeper [21] 10M 3 3 7 7 - Endomondo [20] 10M 7 3 7 7 - MapMyRun [1] 5M 3 3 7 7 - Nike+ [7] 5M 3 3 7 7 - Map My 1M 7 3 7 3 [500,1500], 500 Tracks [18] Table 1: Summary of privacy features offered across different (a) With fewer activities, there are multiple possible EPZs. popular fitness tracking services. #D/Ls: downloads (in mil- lions) on Android Play store.