{"id":267864,"date":"2025-10-01T00:50:19","date_gmt":"2025-10-01T00:50:19","guid":{"rendered":"https:\/\/www.europesays.com\/us\/267864\/"},"modified":"2025-10-01T00:50:19","modified_gmt":"2025-10-01T00:50:19","slug":"your-apps-dark-supply-chain-sdks-ai-and-hidden-tracking","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/267864\/","title":{"rendered":"Your App\u2019s Dark Supply Chain\u2014SDKs, AI And Hidden Tracking"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/10\/960x0.jpg\" alt=\"Unlocked smartphone lock Internet phone hand Business people press the phone to communicate in the Internet. Cyber security concept hand protection network with lock icon and virtual screens Space put message Blue tone\" data-height=\"2475\" data-width=\"3899\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Behind every tap, mobile apps leak more than they admit. Opaque SDKs and embedded AI move data off-device; shifting the burden to developers and making privacy testing routine is how brands earn trust back.<\/p>\n<p>getty<\/p>\n<p>Mobile is where customers live. It\u2019s also where privacy goes missing. <\/p>\n<p>I spoke recently with NowSecure CEO <a href=\"https:\/\/www.linkedin.com\/in\/alansnyder1\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/in\/alansnyder1\/\" aria-label=\"Alan Snyder\">Alan Snyder<\/a> and he didn\u2019t mince words: \u201cThe mobile app is the best surveillance tool ever created on the planet.\u201d That sticks because it\u2019s true on both sides. Users trade convenience for exposure. Companies trade speed for visibility.<\/p>\n<p>\u201cSuccess in any industry often depends on the ability to create software applications that can be accessed and used from any device. When applications can be easily accessed and used from mobile devices, it can drive more business and monetary transactions,\u201d emphasized <a href=\"https:\/\/www.linkedin.com\/in\/melindamarks22\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/in\/melindamarks22\/\" aria-label=\"Melinda Marks\">Melinda Marks<\/a>, practice director for cybersecurity at Enterprise Strategy Group. \u201cHowever, mobile security is often overlooked, so hackers often target vulnerabilities in mobile applications.\u201d <\/p>\n<p>The message is simple: mobile growth is good for business, which makes it a magnet for attackers\u2014and a stress test for trust.<\/p>\n<p>The gap shows up in small choices that add up: permissive defaults, rushed releases and libraries dropped in without review. Teams intend to do the right thing. Then deadlines hit, SDKs update in the background and disclosures drift away from reality. <\/p>\n<p>What you end up with are  apps that feel helpful but quietly spill data to places most people never see.<\/p>\n<p>What the data shows\u2014and why it\u2019s growing<\/p>\n<p>Recent testing paints a pattern. Many iOS and Android apps handle sensitive data and call tracking domains. That doesn\u2019t automatically mean abuse, but it does mean data is moving\u2014farther and faster than most risk teams realize. According to <a href=\"https:\/\/www.nowsecure.com\/blog\/2025\/09\/29\/new-nowsecure-research-targets-mobile-app-privacy-risks-what-you-dont-see-is-hurting-you\/?=undefined&amp;utm_source=google&amp;utm_medium=paid&amp;utm_campaign=branded-homepage-evergreen&amp;utm_term=092524&amp;gad_source=1&amp;gad_campaignid=19535423658&amp;gclid=CjwKCAjw_-3GBhAYEiwAjh9fUDT5QZeZXfe6OXB6-X0zMmr7kFR1f3zYW7fPaFK2szXJ80e9NAy2wxoCzWUQAvD_BwE\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.nowsecure.com\/blog\/2025\/09\/29\/new-nowsecure-research-targets-mobile-app-privacy-risks-what-you-dont-see-is-hurting-you\/?=undefined&amp;utm_source=google&amp;utm_medium=paid&amp;utm_campaign=branded-homepage-evergreen&amp;utm_term=092524&amp;gad_source=1&amp;gad_campaignid=19535423658&amp;gclid=CjwKCAjw_-3GBhAYEiwAjh9fUDT5QZeZXfe6OXB6-X0zMmr7kFR1f3zYW7fPaFK2szXJ80e9NAy2wxoCzWUQAvD_BwE\" aria-label=\"research from NowSecure\">research from NowSecure<\/a>, a big chunk of iOS apps fail to declare what they collect. Many lack a primary privacy manifest. Almost all are missing the required manifests for third-party SDKs, which is where much of the behavior lives.<\/p>\n<p>Snyder\u2019s team has pressed on the mismatch between claims and code. He shared with me that the bad news is their analysis found over 90% of those attestations are wrong. It\u2019s often not malice; it\u2019s blind spots. Developers know their code. They\u2019re less sure about a changing pile of third-party components.<\/p>\n<p>AI is accelerating the problem. Almost one in five of the 183,000 apps reviewed use some form of AI. Thousands send data to external AI endpoints. That adds new data flows, new vendors and new risks. When AI hides inside SDKs as well as first-party code, even basic questions get hard: What leaves the device? Where does it go? How long is it kept?<\/p>\n<p>Who owns the fix\u2014and how to start<\/p>\n<p>\u201cThe burden of this should not fall to the consumer,\u201d stressed Snyder. \u201cThe burden of getting this right should fall to the app developer.\u201d <\/p>\n<p>NowSecure CMO <a href=\"https:\/\/www.linkedin.com\/in\/jonathanbrody\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/in\/jonathanbrody\/\" aria-label=\"Jon Brody\">Jon Brody<\/a> makes the brand case the same way. He shared that trust isn\u2019t a tagline; it\u2019s proof. You earn it by showing what the app actually does, not by promising what it should do.<\/p>\n<p>Marks frames the operational answer: \u201cIt is important for security teams to take a proactive approach to mobile application security with the right tools and processes incorporated into development workflows to help them release secure mobile applications.\u201d Proactive means shifting from paperwork to evidence, and from one-off audits to continuous checks.<\/p>\n<p>Start simple and make it measurable.<\/p>\n<p>First, minimize permissions. If you don\u2019t need precise location, don\u2019t ask for it. Fewer permissions shrink the blast radius and reduce the places data can leak.<\/p>\n<p>Second, map every outbound connection. Label each destination as first-party, SDK vendor, ad\/analytics network, or AI endpoint. If the list is long, ask why. If a new domain appears in a build, treat it as a change request that needs a reason.<\/p>\n<p>Third, reconcile behavior with disclosures on every release. If a new version toggles on microphone access or adds contact uploads, that should trigger human review. The goal is boring alignment: the store page and the real app match.<\/p>\n<p>Fourth, govern SDKs like a supply chain. Approve them, retest them and document why they\u2019re in the build. Replace libraries when their behavior drifts or their vendors won\u2019t provide clarity. Don\u2019t ship what you can\u2019t explain.<\/p>\n<p>Finally, make privacy testing part of the pipeline. Composition analysis and CVEs matter, but mobile risk is also behavioral. Add automated tests that observe data use at runtime, flag risky flows and fail builds when something changes. Treat AI endpoints like any other processor: contracts, controls, monitoring and kill-switches.<\/p>\n<p>Regulatory pressure is also rising\u2014GDPR, state privacy laws and general industry sector rules. \u201cWe didn\u2019t know the SDK did that\u201d won\u2019t help after the fact. The better posture is practical: collect less, keep less, share less. Prove it with evidence you can hand to auditors, customers and your own execs.<\/p>\n<p>The road ahead<\/p>\n<p>The line around \u201cmobile\u201d is blurring. Apps are spreading into cars, TVs and sensors. AI agents will talk to other software without a human in the loop. That multiplies data flows and makes paperwork alone useless. Teams that build continuous visibility now\u2014especially around SDKs and AI\u2014will be ready for that world. Teams that wait will be guessing.<\/p>\n<p>None of this requires heroics. It requires discipline. See what the app really does. Reduce it to the minimum. Make the disclosures match. Keep checking as code and components change. Do that, and you protect users, your brand and your right to keep showing up in the app stores.<\/p>\n","protected":false},"excerpt":{"rendered":"Behind every tap, mobile apps leak more than they admit. Opaque SDKs and embedded AI move data off-device;&hellip;\n","protected":false},"author":3,"featured_media":267865,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[691,139549,139554,738,139555,139550,139551,139553,139552,139548,24925,158,67,132,68],"class_list":{"0":"post-267864","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-alan-snyder","10":"tag-app-security","11":"tag-artificial-intelligence","12":"tag-hidden-tracking","13":"tag-jon-brody","14":"tag-melinda-marks","15":"tag-mobile-privacy","16":"tag-mobile-security","17":"tag-nowsecure","18":"tag-supply-chain","19":"tag-technology","20":"tag-united-states","21":"tag-unitedstates","22":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115296169030436413","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/267864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=267864"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/267864\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/267865"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=267864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=267864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=267864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}