{"id":21453,"date":"2018-03-06T09:00:00","date_gmt":"2018-03-06T14:00:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=21453"},"modified":"2019-11-15T06:40:52","modified_gmt":"2019-11-15T11:40:52","slug":"getcontact-collects-personal-data","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/getcontact-collects-personal-data\/21453\/","title":{"rendered":"GetContact: Find a contact or give your contacts away?"},"content":{"rendered":"<p>\u201cHi! Don\u2019t miss out on this limited-time deal\u2026\u201d Many of us could happily live without another one of these calls. Mobile app developers heard the call, and now some offer the ability to see a number\u2019s reputation when receiving a call, some offer information about the company the number belongs to, and some offer to block known telemarketers. The GetContact app has recently gained popularity among such solutions with an interesting take: It identifies numbers using its users\u2019 own contacts.<\/p>\n<p>GetContact has great potential for success. Having installed it, you will know almost every caller by name and picture; the app pulls up the caller\u2019s personal data and photo from its database.<\/p>\n<p>The app also lets users instantly put callers on a telemarketer black list, easily block unwanted calls, and look up contacts by name or number. Want your hot neighbor\u2019s number? Simply look them up on GetContact! Of course, there is a price you have to pay for these perks: It\u2019s access to your contacts \u2014 the app wants those names and numbers.<\/p><div id=\"attachment_21458\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131505\/getcontact-sasha-sofia.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" aria-describedby=\"caption-attachment-21458\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131505\/getcontact-sasha-sofia-1024x888.png\" alt=\"We tested the app on several colleagues who volunteered for the experiment\" width=\"1024\" height=\"888\" class=\"size-large wp-image-21458\"><\/a><p id=\"caption-attachment-21458\" class=\"wp-caption-text\">We tested the app on several colleagues who volunteered for the experiment<\/p><\/div>\n<p><strong><\/strong><\/p>\n<h2>Nothing wrong with being curious\u2026<\/h2>\n<p><\/p>\n<p>It\u2019s no wonder GetContact is often used in ways not listed in the product description. There\u2019s so much to learn! People all over the world got excited about looking up their numbers to find out what their friends called them, and that started a real epidemic on social media, where users\u2019 feeds are filled with screenshots and jokes referencing the new trend.<\/p><div id=\"attachment_21457\" style=\"width: 509px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131427\/getcontact-petya.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"499\" height=\"885\" aria-describedby=\"caption-attachment-21457\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131427\/getcontact-petya.png\" alt=\"Peter Darth Melon\" style=\"max-height:60vh\" class=\"size-full wp-image-21457\"><\/a><p id=\"caption-attachment-21457\" class=\"wp-caption-text\">Peter Darth Melon<\/p><\/div>\n<p>It gets worse. If the app lets me look myself up, why not look up the numbers of my friends, coworkers, or spouse? This is where users start making unpleasant discoveries. A woman seeing her husband\u2019s number under a female name might suspect him of cheating and get into a big argument. A senior manager of a large company turned up as a \u201cTV salesman\u201d in an old client\u2019s contacts and became an office joke.<\/p>\n<p>Whether it\u2019s in fun or as revenge, the app offers a lot of room for creativity: You can call a person \u201cdrug dealer\u201d or \u201cMy Baby\u201d \u2014 and someone will be sure to ask them for an explanation. But wait, the same can happen to you! To make it worse, the app doesn\u2019t let you track down the person who saved you under this or that name.<\/p><div id=\"attachment_21456\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131324\/getcontact-sasha-katya.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" aria-describedby=\"caption-attachment-21456\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/05131324\/getcontact-sasha-katya-1024x199.png\" alt=\"Is it real or someone's idea of a joke?\" width=\"1024\" height=\"199\" class=\"size-large wp-image-21456\"><\/a><p id=\"caption-attachment-21456\" class=\"wp-caption-text\">Is it real or someone\u2019s idea of a joke?<\/p><\/div>\n<p><strong><\/strong><\/p>\n<h3>Forewarned for your own good<\/h3>\n<p><\/p>\n<p>What about privacy, you ask? GetContact\u2019s website contains a confidentiality agreement in accordance with which the user gives the app access to any personal and corporate data, including data stored by other apps and on social media, as well as the right to share this data with third parties \u2014 in other words, with anyone.<\/p>\n<p>Among other things, GetContact stores your phone books and contacts, photos, e-mail addresses, IP addresses, and conversation records. By accepting its terms, you sign over your personal data to the app \u2014 and your coworkers\u2019 and friends\u2019 data as well.<\/p><div id=\"attachment_21462\" style=\"width: 572px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/06041104\/getcontacte-permissions-EN.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"562\" height=\"1024\" aria-describedby=\"caption-attachment-21462\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/06041104\/getcontacte-permissions-EN-562x1024.png\" alt=\"\" style=\"max-height:70vh\" class=\"size-large wp-image-21462\"><\/a><p id=\"caption-attachment-21462\" class=\"wp-caption-text\">The complete list of data the app can access is scary<\/p><\/div>\n<p>The app\u2019s developers insist that they do not sell their data to anyone. However, they can change their minds at any moment \u2014 the user agreement allows them to transfer data to any third party and contains a clause forcing the user agree to receive mass e-mails\/messages. Even if that doesn\u2019t happen, the possibility of hacks and data leaks should not be discounted.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Can you stop showing my number?<\/h3>\n<p><\/p>\n<p>GetContact developers allow users to take themselves out of the database. To do so, you have to find the Unlist page on the website, enter your number, and send a request. Within 24 hours, the app should stop looking you up in other people\u2019s phone books. However, there is a \u201cbut\u201d: This option is available only to those who delete the app from their own devices. If your curiosity gets the better of you and you install the app again, your number will become visible to everyone again.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Is that even legal?<\/h3>\n<p><\/p>\n<p>GetContact has been officially outlawed in several countries because of its questionable privacy policy, and it\u2019s under close scrutiny for compliance with personal data and other legislation in others. But these measures are late in coming \u2014 the service has already collected several million telephone numbers from users in countries around the world, and it\u2019s unlikely the developers will be interested in deleting them, even if its activities are found to be noncompliant with legislation in this or that jurisdiction. What will GetContact do with all of those contacts? As we said, anything they want.<\/p><div id=\"attachment_21463\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/06041116\/getcontact-counter1.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" aria-describedby=\"caption-attachment-21463\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/06041116\/getcontact-counter1-1024x288.png\" alt=\"\" width=\"1024\" height=\"288\" class=\"size-large wp-image-21463\"><\/a><p id=\"caption-attachment-21463\" class=\"wp-caption-text\">Google Play\u2019s installations number indicates the counter doesn\u2019t exaggerate<\/p><\/div>\n<p><strong><\/strong><\/p>\n<h3>So, what can we do?<\/h3>\n<p><\/p>\n<p>You cannot use an app like GetContact and at the same time be guaranteed privacy. For us, privacy outweighs the satisfaction of seeing that you are not listed in someone\u2019s phonebook as \u201cnot that guy again.\u201d If you feel the same, here\u2019s a couple of things you can do to avoid setting yourself and your friends up for trouble.<\/p>\n<ul>\n<li>When installing a new app, don\u2019t be lazy: Read the user agreement and privacy policy. It\u2019s never a bad thing to know what you\u2019re signing. User agreements seem too long and unreadable? We have a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/eula-gotchas\/17709\/\" rel=\"noopener noreferrer nofollow\">post on how to extract the most important information<\/a> from EULAs in a few minutes.<\/li>\n<li>When giving an app <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/\" rel=\"noopener noreferrer nofollow\">access to data<\/a>, think for a second: Does the app really need access to that kind of information to work? What will happen if the app shares the data publicly? In some cases, you can deny some permissions and the app will work just fine.<\/li>\n<\/ul>\n<blockquote class=\"wp-embedded-content\" data-secret=\"3vdb04Btyw\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" target=\"_blank\" rel=\"noopener nofollow\">All about Android app permissions<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cAll about Android app permissions\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/embed\/#?secret=bt3mCU2Shx#?secret=3vdb04Btyw\" data-secret=\"3vdb04Btyw\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<ul>\n<li>Consider removing any sensitive data, such as credit card numbers or PIN codes, from your address book. This story is just one illustration of why you shouldn\u2019t store such information in a place to which lots of apps request access. It\u2019s better to store it in secure places such as notes in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/password-manager?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2c_kasperskydaily_ban____kpm___\" rel=\"noopener noreferrer nofollow\">Kaspersky Password Manager<\/a>. That way, they are encrypted and stored securely so that only you can get access to them.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>Harmless toy or a way to phish for personal data?<\/p>\n","protected":false},"author":2484,"featured_media":21464,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[2861,2860,1922,181,363,43,97],"class_list":{"0":"post-21453","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-caller-id","9":"tag-getcontact","10":"tag-who-calls","11":"tag-mobile-apps","12":"tag-personal-data","13":"tag-privacy","14":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/getcontact-collects-personal-data\/21453\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/getcontact-collects-personal-data\/12694\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/getcontact-collects-personal-data\/10514\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/getcontact-collects-personal-data\/14829\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/getcontact-collects-personal-data\/13132\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/getcontact-collects-personal-data\/12566\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/getcontact-collects-personal-data\/19795\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/getcontact-collects-personal-data\/10067\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/getcontact-collects-personal-data\/16033\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/getcontact-collects-personal-data\/19738\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/getcontact-collects-personal-data\/19768\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21453"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21453\/revisions"}],"predecessor-version":[{"id":29790,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21453\/revisions\/29790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21464"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}