Steps for Strong Data Security and Privacy — How Secure is Your Data?

Mobile technology is one of the fastest-growing sectors in the world. Unsurprisingly, the risks and technologies for breaching mobile security are also evolving at a crazy rate. Tackling the security and data challenges of clients and end-users is an ongoing, non-stop effort.

4 min readJan 29, 2021


Did you know your smartphone app can access restricted data on your phone despite denying permission? According to a study by International Computer Science Institute (ICSI), there are thousands of apps on Play Store which are capable of accessing restricted data even if they don’t have permission. These apps exploit common SDK libraries embedded in the apps to communicate with another app that has been granted permission to access the same data.

In recent limelight too is the way user data is mined and shared across companies, even when companies are related. According to the Straits Times [WhatsApp fights back over Privacy Concerns as Users Jump to Telegram and Signal, 15 Jan 2021] — Privacy experts said that concerns and uncertainty over how people’s WhatsApp data would be used with the policy changes resulted in a spike in interest for other messaging apps perceived as having better privacy features.

In today’s digital world where data theft and sharing are receiving unprecedented attention, how do you measure your level of privacy with mobile apps you are on?

ARAH Super App

The ARAH Super App addresses these areas of concern through enhancing its processes and protocols. “Every improvement we make is a baby step towards our holistic roadmap for data and security integrity. We care for our users, and strive to provide a safe, respectful and sustainable app environment for everyone”, says Mr Kevin Ang, its Chief Media and Sustainability Director.

World’s First Halal Mobile App

There have been growing interests in setting up guidelines for certifying apps, or even games, as Halal-compliant. Halal, which means “permissible or lawful”, will be extremely useful as a common set of principles to give users a peace of mind. For example, a Halal-certified game will need to adhere to non-violence requirements while a Halal-certified app will have standards to uphold in terms of explicit contents. Data Privacy is also a key element for Halal-certification. Parents will feel safe in letting their children use a Halal app.

Almost a century-old Nahdlatul Ulama (NU), the largest Islamic organization with 100 million members and 194 branches worldwide, is developing the ‘Halal’ ARAH GLOBAL app and ARAH digital asset in collaboration with MJM Networks, Cake Experiential Communications and Finamatrix.

Chat Storage & Procedure

Your ARAH Chats resides on your phone. Your conversations will not be stored in our cloud servers. The transient nature of this chat handling procedure is useful in deterring data theft and upholding conversational and data privacy. The profanity filter implemented for the chat function promotes a healthier chat environment.

The ARAH Coin Protocol

Your ARAH coin is integrated with Waves blockchain, touted as one of the world’s safest cryptocurrency exchanges and investment platforms. Waves is one of the few decentralized exchanges out there. The exchange is secure due to its decentralized nature. Its servers are scattered across the globe, so it is almost impossible for hackers to get a hold of all of the servers and hack into the system.

Even in the case of someone managing to break into the servers, they would not be able to access sensitive information about the users. This is because decentralized exchanges do not require personal information from the users for them to register an account. As trading is done directly between two users, Waves does not need to verify identification or address because it does not participate in the transaction. Hence, hackers cannot access users’ personal information, even if they did manage to hack all of the servers in the system.

Sustainable Sourcing

Our global partnership framework requires us to source for reputable or promising partners to work with. One of the key elements in selecting our partners e.g. product manufacturers, data servers etc. is their commitment towards data security and privacy to uphold the trust we have with our users.





#1 NAS100 Risk-Tech Database 1985 ($FIX)