Boingo Wi-Finder 6.1.240.0012 (Android / Google Play)

175x175bb127

This application is available for Android. This app is designed to locate and connect to public available Wi-Fi hotspots. The latest build was released on May 11, 2017. Our latest check was performed on Oct 7th, 2016.

Findings Summary

Our examination revealed total 20 items, where were 15 DAR items and 5 DIT items found. Among DAR items were found 0 worst items, 15 bad items, 0 good items, and 0 best items. Among DIT items were found 0 worst items, 0 bad items, 5 good items, and 0 best items.

Below you find 2 infographics summarizing what we described above. Each image provides information about both DAR and DIT items.

 

 

 

This slideshow requires JavaScript.


Everything presented below is related to well-known CWEs, such as Sensitive data leakage [CWE-200], Unsafe sensitive data storage [CWE-312], Unsafe sensitive data transmission [CWE-319]. You can read more about it here.

Now let’s go deeper and examine each data item’s protection level.

 

Application Description

Let’s cite the description of this application below:

Now it’s easier than ever to locate any of our 1 million Wi-Fi hotspots worldwide with Boingo Wi-Finder!
***** Six time Global Traveler Award Winner: Best Wi-Fi Service
***** Named “Best Wi-Fi Network Operator” by WBA
***** Travel & Leisure Top 10 Travel Apps
With Boingo Wi-Finder, you get:

  • Hotspot Notifications: Wi-Finder actively finds and notifies you when you are at a Boingo hotspot.
  • Hotspot Location Maps: Whether you”re traveling around the corner or around the world, it”s good to know where to stay connected to Wi-Fi. Just open the search menu to find hotspots. Get results on a map or list view.
  • Access to Boingo Hotspots: Boingo Wi-Finder lets you quickly sign up and pay to access Wi-Fi at over 1 Million hotspots worldwide, including airports, hotels, coffee shops, convention centers and more!
  • Take advantage of our security offer when online: Obtain a Passpoint profile if your device supports it, or install Hotspot Shield VPN (protect your data from hackers and keep your Internet activity on open Wi-Fi networks secure).

If you have an existing Boingo account, use the “Account” menu item to enter your username and password, and you’ll be ready to connect to Wi-Fi hotspots.
Use Wi-Fi and avoid expensive cellular data overage fees! Not only will your Internet connection be up to 3 times faster than cellular data but you”ll also save money while enjoying:

  • Seamless video streaming or video chat experience
  • Large file downloads including apps, movies, music and TV shows direct to your device fast!
  • Multi-player gaming with other friends over the network
  • Saving big money when traveling abroad – turn your phone to “Airplane mode” and connect to Wi-Fi. Check your email, surf the Internet, and make calls over VOIP (like Skype) — all without incurring huge international data roaming charges.

Boingo is committed to making your Wi-Fi experience great. We offer free 24/7 customer support, no contracts, and no cancellation fees. Try Boingo today!
Don’t just go. Boingo!®
Find us online at http://www.boingo.com
Friend us on Facebook at http://www.facebook.com/boingo
Follow us on Twitter at http://www.twitter.com/boingo
Read great articles and interviews about tech gadgets, travel and more at http://www.boingo.com/blog

 

Protection levels.

Locally stored data (Data-at-Rest, DAR).

Locally stored data groups include Log Information, Location ‘n’ Maps Information, Personal ‘n’ Private Information, Analytics ‘n’ Ads Information, Credentials Information, Application Information, Device Information.
The average DAR value is 3.50 points (7.00 points of system protection and 0.00 points of own protection). It equals to a typical value (3.5 points, where’s 7 points of system protection and 0 points of own protection).

Items with average value 3.50 points (7 points of system protection, 0 points of own protection) means data protection levels have following definitions. Frankly talking, extra data found that shouldn’t be accessed where system protection level means – root/jailbreak is required but not possible without wiping device data, and own protection level means – stored as is.

– GEO Data (‘Log Information’ Group) – Any GEO info stored as plain text referred to the places or tracked activity. This data item related to mentioned group meant to be any information stored in local or network logs,

– Environment (‘Log Information’ Group) – Different info about the environment of the device including apps lists, device info, OS name and versions, updates, a list of users, network details, etc. This data item related to mentioned group meant to be any information stored in local or network logs,

– Credentials (IDs) (‘Log Information’ Group) – Only account IDs like app or 3rd party user IDs including emails, phone number, usernames, etc. (depends on apps). This data item related to mentioned group meant to be any information stored in local or network logs,

– Application Configs (‘Log Information’ Group) – Different configuration files created by your app, perhaps app permissions. This data item related to mentioned group meant to be any information stored in local or network logs,

– GEO Data (‘Location ‘n’ Maps Information’ Group) – Any GEO info stored as plain text referred to the places or tracked activity. This data item related to mentioned group meant to be any geodata from trackers, social networks, GPS, etc.,

– Address Data (‘Location ‘n’ Maps Information’ Group) – Home, work or another type of owner address stored by apps. This data item related to mentioned group meant to be any geodata from trackers, social networks, GPS, etc.,

– Personalization (‘Personal ‘n’ Private Information’ Group) – Info describes user preferences, favorites, tracked data, search requests, suggestions, etc. This data item related to mentioned group meant to be any personal and private info is not grabbed from the 3rd party social networks or your IDs,

– Device Data (‘Analytics ‘n’ Ads Information’ Group) – Device ID, Device Name, Device OS Name and Version, and jailbroken/root status. This data item related to mentioned group meant to be any info related to analytics services like Flurry, Google Analytics, etc. or advertisements,

– Credentials (Tokens) (‘Analytics ‘n’ Ads Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually give full access to your account). This data item related to mentioned group meant to be any info related to analytics services like Flurry, Google Analytics, etc. or advertisements,

– Credentials (Access IDs) (‘Analytics ‘n’ Ads Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually don’t give full access to your account because based on permissions linked to these access tokens). This data item related to mentioned group meant to be any info related to analytics services like Flurry, Google Analytics, etc. or advertisements,

– Session Details (‘Credentials Information’ Group) – Typical logged session data like connection activity, transferred data, perhaps credentials IDs, rarely access IDs, tokens or passwords. This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Application Configs (‘Application Information’ Group) – Different configuration files created by your app, perhaps app permissions. This data item related to mentioned group meant to be any info related to the app, app settings, including installed apps or installers,

– Credentials (IDs) (‘Credentials Information’ Group) – Only account IDs like app or 3rd party user IDs including emails, phone number, usernames, etc. (depends on apps). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Credentials (Passwords) (‘Credentials Information’ Group) – Well-known passwords or PINs you’re using to get access to your account (usually it is worse than tokens because it gives full access to your account). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Device Details (‘Device Information’ Group) – Includes basic device details plus hardware key and fingerprints as well as IMEI. This data item related to mentioned group meant to be details about your device

Keep in mind if you’re using some Android devices such Samsung, LG or another device with an unlocked or non-locked loader that allow rooting your device without user action, the system level equals 6 points instead of 7. It means your data can be stolen without involving your actions.

Transferred data (Data-in-Transit, DIT).

Transferred data groups include Location ‘n’ Maps Information, Credentials Information, Personal ‘n’ Private Information.
The average DIT value is 5.00 points (6.00 points of system protection and 4.00 points of own protection). It is higher than a typical value (4 points, where’s 4 points of system protection and 4 points of own protection).

Items with average value 5.00 points (6 points of system protection, 4 points of own protection) means data protection levels have following definitions. Frankly talking, data is not available all the time or partially accessed where system protection level means – MITM prevented or fake certificate importing prevented, but plaintext non-protected traffic is intercepted, and own protection level means – bypassed by fake/stolen root certificates.

– Address Data (‘Location ‘n’ Maps Information’ Group) – Home, work or another type of owner address stored by apps. This data item related to mentioned group meant to be any geodata from trackers, social networks, GPS, etc.,

– GEO Data (‘Location ‘n’ Maps Information’ Group) – Any GEO info stored as plain text referred to the places or tracked activity. This data item related to mentioned group meant to be any geodata from trackers, social networks, GPS, etc.,

– Credentials (Tokens) (‘Credentials Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually give full access to your account). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Credentials (Access IDs) (‘Credentials Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually don’t give full access to your account because based on permissions linked to these access tokens). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Personalization (‘Personal ‘n’ Private Information’ Group) – Info describes user preferences, favorites, tracked data, search requests, suggestions, etc. This data item related to mentioned group meant to be any personal and private info is not grabbed from the 3rd party social networks or your IDs

Keep in mind if you’re using out-of-date Android < 7.0, the system level equals 4 points instead of 6. It means your data can be stolen with a crafted preinstalled certificate on the device or if someone makes you install a certificate. Also, if you’re using out-of-date Android < 5.0, the system level equals 2 points instead of 4. It means your data can be stolen without involving your actions.

Privacy Policy

Full application privacy policy is available here.

You may find privacy policy details proceeding the link above to compare developer’s vision on data protection with our results.