Mobile Security
Project overview
App Selection
Set Up
Methodology
Experiment 1
Experiment 2
Experiment 3
Experiment 4
Results
Where does data go?
Where does data go?