By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Tracing Personal Data Through APIs | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Tracing Personal Data Through APIs | HackerNoon
Computing

Tracing Personal Data Through APIs | HackerNoon

News Room
Last updated: 2026/01/21 at 7:08 AM
News Room Published 21 January 2026
Share
Tracing Personal Data Through APIs | HackerNoon
SHARE

Table Of Links

Abstract

1 Introduction

2 Background

3 Privacy-Relevant Methods

4 Identifying API Privacy-relevant Methods

5 Labels for Personal Data Processing

6 Process of Identifying Personal Data

7 Data-based Ranking of Privacy-relevant Methods

8 Application to Privacy Code Review

9 Related Work

Conclusion, Future Work, Acknowledgement And References

Identifying API Privacy-Relevant Methods

Native privacy-relevant methods form the basis for identifying what we refer to as API privacyrelevant methods. These are methods found in third-party libraries and frameworks that are likely to process personal data by calling upon native privacy-relevant methods. Understanding the relationship between API and native methods is crucial for a complete review of how personal data is processed in a codebase.

The identification process is iterative and takes into account the dependencies between libraries and codebases, as depicted in Fig. 2. The goal is to assemble a list of API privacy-relevant methods that have the potential to handle personal data. Understanding the relationship and dependency hierarchy among these libraries is essential for accomplishing this task.

4.1 Dependency Sorting and Identification of Privacy-relevant Methods

To manage library dependencies, we focus on import statements within each library’s source code. We organize the libraries in a sequence such that each library is evaluated only after all its dependencies have been assessed. This ensures a logical and efficient evaluation process. For the identification of API privacy-relevant methods, we define a set denoted as API.

This set includes methods from our organized list of libraries that invoke native privacy-relevant methods at some point during their execution. These methods are significant as they interact with native methods, either directly or through a chain of calls, making them critical for privacy code review.

Labels For Personal Data Processing

Compliance with data protection regulations like GDPR necessitates a nuanced understanding of how personal data is processed within code. While GDPR outlines various processing activities such as collection, recording, and organization, the four native privacy-relevant method categories [8] we previously discussed (I/O, security, database, and network) lack the granularity needed for comprehensive understanding.

For instance, the security category encompasses both authentication and encryption, warranting a more detailed labeling system. After analyzing top labels from Maven and NPM that pertain to personal data processing, we identified 20 labels that closely align with both GDPR’s definitions and our native privacyrelevant method categories. This shows how libraries handle data processing in different ways. For example, OAuth combines network and security functionalities, while Object-Relational Mapping (ORM) bridges database and I/O operations.

These overlaps underscore the necessity for a detailed set of labels tailored for privacy reviews. We present these labels and their alignment with GDPR requirements in Table 1. These labels serve a dual purpose: they categorize methods involved in data processing activities like collection, storage, and encryption, and they map these activities to GDPR compliance requirements. This streamlined mapping simplifies the task of identifying code sections that need to comply with legal standards. In our later approach, we use these labels to prioritize privacy-relevant methods, enabling a focused review on areas critical for data protection.

:::info
Authors:

  1. Feiyang Tang
  2. Bjarte M. Østvold

:::

:::info
This paper is available on arxiv under CC BY-NC-SA 4.0 license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Urgent Asian hornet warning after nest found at new UK site – ‘be vigilant’ Urgent Asian hornet warning after nest found at new UK site – ‘be vigilant’
Next Article Has this well-known smartphone maker launched its last device? Has this well-known smartphone maker launched its last device?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Animal Crossing’s ​new ​update ​has revive​d ​my ​pandemic ​sanctuary
Animal Crossing’s ​new ​update ​has revive​d ​my ​pandemic ​sanctuary
News
Unitree Robotics begins IPO prep, valued at .6 billion after Series C funding · TechNode
Unitree Robotics begins IPO prep, valued at $1.6 billion after Series C funding · TechNode
Computing
AI Was Everywhere at CES, but the Real Innovation Is Human
AI Was Everywhere at CES, but the Real Innovation Is Human
News
Chipper Cash posts first quarter without cash burn 
Chipper Cash posts first quarter without cash burn 
Computing

You Might also Like

Unitree Robotics begins IPO prep, valued at .6 billion after Series C funding · TechNode
Computing

Unitree Robotics begins IPO prep, valued at $1.6 billion after Series C funding · TechNode

1 Min Read
Chipper Cash posts first quarter without cash burn 
Computing

Chipper Cash posts first quarter without cash burn 

4 Min Read
Dash’s 12-year journey: How One Cryptocurrency Outlasted Thousands That Launched Alongside It | HackerNoon
Computing

Dash’s 12-year journey: How One Cryptocurrency Outlasted Thousands That Launched Alongside It | HackerNoon

7 Min Read
Webinar: How Smart MSSPs Using AI to Boost Margins with Half the Staff
Computing

Webinar: How Smart MSSPs Using AI to Boost Margins with Half the Staff

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?