12 votes

Fifty ways to leak your data: An exploration of apps’ circumvention of the Android permissions system