The reason behind all the potential leak is due to the fact that applications which deal with Google services do request authentication tokens. The upside of these tokens would be doing away with the user’s need to login to the service, but sometimes they are sent in plain text form over wireless networks – which translates to anyone eavesdropping on the Wi-Fi network being able to grab hold of these tokens, and hijack your handset. In addition, since the tokens are not specific to the handset, it means a token that is meant for a particular handset could see action on another instead.
What are some of the implications of this potential PR disaster? It could result in disclosure to loss of personal information for the Calendar data. As for Contact information, private information of others will also be affected, and that includes the potential of having your phone numbers, home addresses and email addresses being snooped at. Even worse is the longevity of such tokens – imagine taking 14 days for your Calendar token to expire!
For those who rely on Google services over their Android smartphone for everyday use, here are some suggestions to plug up these holes. Start by upgrading to an Android version that offers HTTPS for Google Calender and Contacts sync, or turn off automatic sync when using open Wi-Fi. Last but not least, steer clear of affected apps on open Wi-Fi connections.