Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts

 A viral app called Neon, which offers to record your phone calls and pay you for the audio so it can sell that data to AI companies, has rapidly risen to the ranks of the top-five free iPhone apps since its launch last week.

The app already has thousands of users and was downloaded 75,000 times yesterday alone, according to app intelligence provider Appfigures. Neon pitches itself as a way for users to make money by providing call recordings that help train, improve, and test AI models

But Neon has gone offline, at least for now, after a security flaw allowed anyone to access the phone numbers, call recordings, and transcripts of any other user, TechCrunch can now report.


TechCrunch discovered the security flaw during a short test of the app on Thursday. We alerted the app’s founder, Alex Kiam (who previously did not respond to a request for comment about the app), to the flaw soon after our discovery. 


Kiam told TechCrunch later Thursday that he took down the app’s servers and began notifying users about pausing the app, but fell short of informing his users about the security lapse.


 The Neon app stopped functioning soon after we contacted Kiam.


Call recordings and transcripts exposed

At fault was the fact that the Neon app’s servers were not preventing any logged-in user from accessing someone else’s data.


TechCrunch created a new user account on a dedicated iPhone and verified a phone number as part of the sign-up process. We used a network traffic analysis tool called Burp Suite to inspect the network data flowing in and out of the Neon app, allowing us to understand how the app works at a technical level, such as how the app communicates with its back-end servers.


After making some test phone calls, the app showed us a list of our most recent calls and how much money each call earned. But our network analysis tool revealed details that were not visible to regular users in the Neon app. These details included the text-based transcript of the call and a web address to the audio files, which anyone could publicly access as long as they had the link.


For example, here you can see the transcript from our test call between two TechCrunch reporters confirming that the recording wo

rked properly.


Comments

Popular posts from this blog

Starbucks store closings: Here's the list, so far, of locations shutting down nationwide

Safaree & Kimbella Private Video Leaked, Fans Point To Erica Mena

Capt. Donald Cragen Dies in ‘Law & Order: SVU’ Season 27 Premiere

Family members save children when mother tries to drown them, deputies say