The tool
Visualization Examples
About Recon
Includes two lists: 1)Summary table with the list of information categories that Recon has assessed and 2)Complete list of all applications that leaked information.
Try it!
Full visualization on how iOS Applications are leaking data to different domains
Detailed list of how many applications and domains are sending/receiving information to tracker domains, by type of information leaked
Detailed list of tracker domains, including applications and types of information being leaked to every receiving domain