In this game, the employer’s App leverages its execution privilege to try to leak Points Of Interest of the user. Two versions of a malicious Data Task are available and they leak data differently.
The goal here is to run both versions and explain the malicious data tasks logic and their differences. In particular, what is the precise leaking strategy that each Data Task implement ? If you want to submit your explanation, please use the form at the bottom of the page.
PDMS version
Note that:
|
Run: 00 Nb of retrieved POIs: 00First POI retrieved at run: |
Run: 00 Nb of retrieved POIs: 00First POI retrieved at run: |