Summary of information leak categories and applications
Includes two lists: 1)Summary table with the list of information categories that Recon has assessed and 2)Complete list of all applications that leaked information.
Detailed analysis of tracking domains in iOS Applications
Full visualization on how iOS Applications are leaking data to different domains
Types of Information leaked to trackers
Detailed list of how many applications and domains are sending/receiving information to tracker domains, by type of information leaked
Tracking Domains
Detailed list of tracker domains, including applications and types of information being leaked to every receiving domain