FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Popular Android VPNs leak data, hide China links

John Melendez
Last updated: September 5, 2025 3:12 am
By John Melendez
SHARE

Some of the most-downloaded Android VPN apps are exposing users to surveillance and quietly obscuring who runs them, according to new academic research that links multiple brands to the same operators and to companies in China. The study details encryption failures that let snoops read traffic, undisclosed data collection, and shell-company tactics that hide true ownership across apps with a combined 700 million-plus installs.

Table of Contents
  • What the researchers found
  • Hard-coded keys and weak ciphers
  • Opaque ownership and China links
  • Google Play’s oversight problem
  • What users can do now
  • The bottom line

What the researchers found

In a report titled “Hidden Links: Analyzing Secret Families of VPN Apps,” investigators from the University of Toronto’s Citizen Lab and Arizona State University examined the 100 most-downloaded mobile VPNs and dug into those not based in the U.S. They cross-referenced app code, shared libraries, developer certificates, server infrastructure, business filings, and web domains to map relationships that aren’t visible on a Google Play listing.

Android VPNs leaking user data and concealing China ties raise privacy risks

The analysis clustered the apps into three “families” that share code and infrastructure. The researchers say some providers appear to be centrally owned and operated by a Chinese company despite public-facing brands and corporate registrations designed to suggest otherwise.

Hard-coded keys and weak ciphers

In one group tied to providers including Innovative Connecting, Autumn Breeze, and Lemon Clove, the team found a critical error: a hard-coded password used with the Shadowsocks protocol. Because every client used the same secret, any on-path observer could decrypt traffic between the app and its server—defeating the core promise of a VPN.

A second cluster, responsible for apps such as Global VPN, XY VPN, and Super Z VPN, reused the same servers and similarly embedded credentials in code. The research also flagged deprecated cryptography in some implementations and warned that Shadowsocks—originally built to bypass censorship—shouldn’t be treated as an anonymity or privacy tool.

A third group behind apps including Fast Potato VPN and X-VPN showed additional network weaknesses, such as susceptibility to blind on-path attacks. On shared Wi‑Fi, that opens the door to traffic manipulation, not just passive eavesdropping.

The investigators also observed behavior that contradicts marketing claims: several apps queried a geo‑IP service for the user’s IP-based ZIP code and uploaded it to provider servers. That kind of location tagging is at odds with “no logs” positioning and expands the risk if data are ever shared or breached.

Opaque ownership and China links

The Tech Transparency Project has previously connected some of the named providers to Qihoo 360, a large Chinese cybersecurity firm that has faced U.S. sanctions over ties to the People’s Liberation Army. The new research echoes those findings, arguing that multiple app “brands” mask common control, shared codebases, and co-located infrastructure.

Popular Android VPNs leaking data, hiding China links

Why split one operation into many VPNs? It widens search visibility, lowers engineering costs through code reuse, and isolates reputational fallout—if one brand is called out, others keep converting users. For consumers, the risk is straightforward: the operator that controls the servers controls the traffic. When that control is paired with weak encryption and undisclosed data collection, privacy promises collapse.

Google Play’s oversight problem

All of the flagged apps were available via the Google Play Store. The researchers note that uncovering cross-app relationships—matching SDK fingerprints, server IP clusters, TLS certificates, and shell-company paperwork—is labor-intensive and not easily automated at scale, which helps such networks persist.

Security experts argue the storefront can do more. Practical steps include scanning for hard-coded secrets, clustering apps by shared backend infrastructure, flagging recycled privacy policies, and requiring independent audits for “no-logs” claims. Clear, verified developer identity disclosures would also make it harder to hide ownership behind layers of affiliates.

What users can do now

Treat mobile VPNs as high-trust software. Prefer providers with recent third-party audits from reputable firms such as Cure53 or NCC Group, and look for open-source clients and transparent leadership. Modern protocols like WireGuard or IKEv2/IPsec are stronger choices for privacy than Shadowsocks.

Scrutinize app listings for telltale signs: generic publisher names, identical screenshots across “different” brands, copy‑paste privacy policies, and the same server lists. Check permissions, insist on a kill switch, and test for DNS and WebRTC leaks using well-known tools. If an app is free, assume your data is the product until proven otherwise.

Consumer watchdogs and digital rights groups have repeatedly warned that VPN trust hinges on accountability. Academic labs can uncover flaws, but without store-level enforcement and verifiable transparency from providers, users remain exposed.

The bottom line

The evidence is clear: several popular Android VPNs leak data, rely on weak or misapplied encryption, and obscure links to China through a web of brands. Until app stores demand stronger proof and developers submit to independent verification, the safest path is informed skepticism and careful selection—not blind trust in the top result.

Latest Articles
OpenAI launches AI hiring platform to challenge LinkedIn
Technology
Mark Zuckerberg sues Mark Zuckerberg over Facebook bans
Technology
Revolve, FWRD and Vivrelle debut AI stylist ‘Ella’
Technology
iPhone 17 and Apple’s thinnest iPhone: What to expect
Technology
Atlassian Buying Arc Maker for $610M
Business
Madrid startup Orbital Paradigm targets cheaper reentry
Technology
DuckDuckGo bundles top AI models in $9.99 plan
Technology
Nepal blocks Facebook, Instagram, YouTube, X
Technology
Stripe Rallies AI and Banks for a New Blockchain
Business
Facebook revives pokes with a gamified twist
Technology
TED veteran’s $300M bet on climate’s valley of death
Business
X expands XChat encrypted DMs to more users
Technology
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.