A new investigation has found that several widely used opioid treatment recovery apps are accessing and sharing sensitive user data with third parties.
As a result of the COVID-19 pandemic and efforts to reduce transmission in the U.S, telehealth services and apps offering opioid addiction treatment have surged in popularity. This rise of app-based services comes as addiction treatment facilities face budget cuts and closures, which has seen both investor and government interest turn to telehealth as a tool to combat the growing addiction crisis.
While people accessing these services may have a reasonable expectation of privacy of their healthcare data, a new report from ExpressVPN’s Digital Security Lab, compiled in conjunction with the Opioid Policy Institute and the Defensive Lab Agency, found that some of these apps collect and share sensitive information with third parties, raising questions about their privacy and security practices.
The report studied 10 opioid treatment apps available on Android: Bicycle Health, Boulder Care, Confidant Health. DynamiCare Health, Kaden Health, Loosid, Pear Reset-O, PursueCare, Sober Grid, and Workit Health. These apps have been installed at least 180,000 times and have received more than $300 million in funding from investment groups and the federal government.
Despite the vast reach and sensitive nature of these services, the research found that the majority of the apps accessed unique identifiers about the user’s device and, in some cases, shared that data with third parties.
Of the 10 apps studied, seven access the Android Advertising ID (AAID), a user-generated identifier linked to other information to provide insights into identifiable individuals. Five of the apps also access the devices’ phone number; three access the device’s unique IMEI and IMSI numbers, which can also be used to uniquely identify a person’s device; and two access a users’ list of installed apps, which the researchers say can be used to build a “fingerprint” of a user to track their activities.
Many of the apps examined are also obtaining location information in some form, which, when correlated with these unique identifiers, strengthens the capability for surveilling an individual person and their daily habits, behaviors, and who they interact with. One of the apps’ methods is through Bluetooth; seven of the apps request permission to make Bluetooth connections, which the researchers say is particularly worrying because this can be used to track users in real-world locations.
“Bluetooth can do what I call proximity tracking, so if you’re in the grocery store, it knows how long you’re in a certain aisle, or how close you are to someone else,” Sean O’Brien, principal researcher at ExpressVPN’s Digital Security Lab who led the investigation, told TechCrunch. “Bluetooth is an area that I’m pretty concerned about.”
Another central area of concern is the use of tracker SDKs in these apps, which O’Brien previously warned about in a recent investigation that revealed that hundreds of Android apps were sending granular user location data to X-Mode, a data broker known to sell location data to U.S. military contractors, and now banned from both Apple and Google’s app stores. SDKs, or software development kits, are bundles of code included with apps to make them work properly, such as collecting location data. Often, SDKs are provided for free in exchange for sending back the app’s cache data.
While the researchers are keen to point out that it does not categorize all usage of trackers as malicious, exceptionally as many developers may not even be aware of their existence within their apps, they discovered a high prevalence of tracker SDKs in seven out of the 10 apps that revealed potential data-sharing activity. Some SDKs are explicitly designed to collect and aggregate user data, even where the SDK’s core functionality is concerned.
But the researchers explain that an app, which provides navigation to a recovery center, may also be tracking a user’s movements throughout the day and sending that data back to the app’s developers and third parties.