Get statistics about your phone use and contribute to scientific research!
Device Analyzer works on Android devices running Android 2.1 or higher.
All of this data is tagged with a time stamp. Some entries are stored hashed. Hashing allows us to assign a name to the real data, while protecting the real data.
Here's an example: Say you don't want us to know the phone numbers you call. However, it would be useful for us to know if you always call the same person or if you call many different people.
Instead of sending all your phone numbers, we dream up a name that is derived from the phone number, but doesn't allow us to know which number it was. So instead of the real phone number 123456 we would say you called "A57". From then on, when you call 123456 again, we will get the information that you called "A57" again. But we won't know the number behind that name.
If you want to disappear from the radar for some time you can easily pause recording for a while from within Device Analyzer.
This data will usually be shared online after you had three months to inspect your data on the website. If you prefer, you can specify easily and directly within the application that you'd like your data stream to be used only within the University of Cambridge.
- when you turn your phone on and off
- the version of the operating system and the type of device
- the system's local time
- the amount of free internal and external storage
- when the external storage card is inserted or removed
- which parts of Device Analyzer you use as well as internal logging and crash reporting (yes, it analyzes itself!)
- whether your phone is ringing normally, is silent or on vibrate
- the volume of the different audio streams (ringer, media volume, etc.)
- the times at which the phone is charging
- the battery level and voltage
- the times when you take pictures and how many pictures you have
- the times when the screen is turned on and off
- the brightness level of the screen and whether brightness is dynamically adjusted
- when you enable and disable airplane mode
- when which mode of network connectivity is available
- the hashed identifier of the inserted SIM card
- whether the phone is roaming or not
- cellular signal strength
- the amount of data transferred over 3G and wifi
- the times when phone calls are made and text messages are sent and received as well as the number of characters per text message
- hashed values for the phone numbers involved
- when you enable and disable Bluetooth and wifi
- hashed data about wifi networks that are in range
- hashed data about Bluetooth devices (hashed) in the vicinity if another application initiates a Bluetooth scan (Device Analyzer will not initiate a scan by itself)
- when you enable tethering or the mobile hotspot
We will collect the following data about applications on your device:
- the list of markets where at least one application was installed from
We will also collect the following data for applications. This data will be shared without revealing the names of the applications unless you have given us express permission to publicly share the names from within the application.
- the list of installed applications and which market they were installed from
- updates and removals of applications
- when you clear the data of an application
- the running processes and their memory and CPU usage as well as their importance
- the 10 most recently started tasks
Hashed GSM Cell IDs
We collect the ID of the GSM cell your phone is connected to and will by default release this ID only in a hashed form so that it doesn't give away your physical location. From within the application you can give us permission to reveal the visited network cells in clear.
Based on the network cell that you are connected to we estimate your coarse location every 5 minutes. This data is only used internally and not passed on unless you explicitly tell us to do so.