FINDING · DETECTION
All six browsers grant dangerous Android permissions (READ_PHONE_STATE, INTERNET, ACCESS_NETWORK_STATE) to third-party SDKs; built-in phone browsers grant significantly more such permissions than app-store browsers. Baidu Mobile Tongji Analytics SDK—present in all six via Baidu as default search engine—collects IMEI, UUID, CUID, GAID, device MAC, and Bluetooth MAC, creating a persistent cross-app device fingerprint that identifies users across VPN sessions and survives IP changes.
From 2025-rodriguez-revisiting — Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks · §4.3 · 2025 · Free and Open Communications on the Internet
Implications
- Circumvention tool developers building Android apps must audit which third-party SDKs are linked in the same APK or on the same device; Baidu, Tencent, and device-manufacturer SDKs with READ_PHONE_STATE access create persistent hardware identifiers that re-identify users regardless of VPN IP rotation.
- Assume that any device running Chinese built-in browsers already has its IMEI/GAID/MAC known to Baidu and Tencent servers; circumvention tools relying on device-identity-based anonymity or unlinkability properties should treat this as a broken assumption on such devices.
Tags
Extracted by claude-sonnet-4-6 — review before relying.