• VintageTech@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    21 minutes ago

    I don’t think enough people have mentioned that Auto manufacturers have been able to locate vehicles since the 90’s.

  • xylogx@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    14 minutes ago

    A lot of great comments here. I just wanted to add that even just your ip address is enough to roughly track your location. When your phone checks gmail you are leaving digital breadcrumbs in Google’s logs of your ip address which roughly tracks your location. App permissions will not solve this. We need strong privacy regulations with teeth.

  • FlashMobOfOne@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    4 hours ago

    I have my location turned off for everything and keep mine in a Faraday bag. That said, there was one tip in this article I wasn’t aware of: deleting my advertising ID, so everyone should read it and see if you can’t improve your own privacy.

    It feels good when I have to use it and, for a moment it says “no service”, like kicking the tech assholes in the dick.

    • ayyy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      49 minutes ago

      Reverse justification answer: to more securely verify your identity when signing into your Microsoft account

      Real answer: selling ads and building a free database for Microsoft that accurately maps IP address->physical location

      While the first statement really is true, it still doesn’t justify the other things.

  • Evil_Shrubbery@lemm.ee
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    1
    ·
    edit-2
    6 hours ago

    Use FOSS as much as possible, pressure your gov to implement laws against tracking (against what Snowden showed us).

    There is no need to know the location and history, and the communication of everyone everywhere.

  • Imhotep@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    6 hours ago

    I loved xprivacy_lua

    You could hide almost everything.
    No app knew the other apps I used.
    No app had clipboard access. when I needed to paste something I used Xposed Edge.
    You could spoof a lot of info, GPS coordinates, IMEI … The list goes on.

    support stopped. I should check if there’s a fork.

    edit: AOSP permissions have improved and I now use almost exclusively FOSS apps, so I’m not worried, but I still miss the app.

    edit2: there’s a fork: https://xdaforums.com/t/xpl-ex-xprivacylua-ex-android-privacy-manager-hooking-manager-extended.4652573/

  • magic_smoke@links.hackliberty.org
    link
    fedilink
    English
    arrow-up
    36
    ·
    edit-2
    8 hours ago

    If you have a device that’s actively connected to a cellular network, and has been while in your home or work, then your only option is to leave it behind or turn it off. That includes your car if it was made in the past decade, if nothing else, so it can catch OTA firmware updates, and send telemetry data.

    GPS and location services don’t mean shit when your carrier keeps logs of where you’ve been based on cell-tower triangulation.

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      7 hours ago

      Do we know how carrier shares cell data?

      In another thread, it was suggested thet “cant” just sell it like they isp traffic data for example.

      Obviously the state can get it since is logged. Not sure if they would need s warrant tho

      • The Octonaut@mander.xyz
        link
        fedilink
        English
        arrow-up
        12
        ·
        7 hours ago

        I work for a telecom. In my country there is well regulated legislation that specifies how and when the police can ask the telecoms for cell location data, usually used for missing people.

        They also provide large scale, anonymised data for crowd movement analysis. For example it was used to demonstrate how 60,000 people moved into and out of a stadium located for historical reasons in an old-fashioned, dense residential area, in preparation for the arrival of English football fans.

        • magic_smoke@links.hackliberty.org
          link
          fedilink
          English
          arrow-up
          10
          ·
          6 hours ago

          You also have to assume that your government has never illegally obtained data it shouldn’t have in a shady manner.

          It also doesn’t bode well for what happens if your country falls into fascism, as all that data will still exist to be systematically, and retroactively used against you.

          • The Octonaut@mander.xyz
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 hours ago

            One of the good things about living in Ireland is that I’m 99% our government is neither competent enough to perpetrate elaborate crimes against its people without being exposed almost instantly, nor powerful enough that even fascists getting into government would have a meaningful impact bar providing a colourful humorous segment of the inevitable documentary on Europe’s second fall to the Axis.

  • Drunemeton@lemmy.world
    link
    fedilink
    English
    arrow-up
    57
    ·
    11 hours ago

    One thing I am always aware of are apps that want permission to access Bluetooth and/or Wi-Fi and/or Networks.

    Even though Bluetooth is very short ranged it can still be used to tie you into a location within a database based on other database records that are more detailed.

    Yeah, I love playing you “My Great Dog-sitting Simulator” (not a real app) but you do not need access to my BT. The OS handles sending your audio to my headphones!

    • asbestos@lemmy.world
      link
      fedilink
      English
      arrow-up
      21
      ·
      9 hours ago

      Teams is the worst, you can’t join any call if you don’t allow it to scan your local network. I wish the executives a very nice and agonizing death.

      • toynbee@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        9 hours ago

        I haven’t done an extensive survey or anything, but every modern router I’ve interacted with supports setting up a secondary WiFi network with guest isolation (so anything on that SSID can’t see any network device besides the router and itself). This is useful for apps or hardware that is untrusted and/or demands unjustified permissions.

        • asbestos@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 hours ago

          Correct, using the guest network is better but I think turning off WiFi and just using mobile data is sufficient. I wonder if the permission applies to cellular connectivity as well.

          • toynbee@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            4 hours ago

            Sure, removing your network from the equation is definitely a more secure option; just make sure the app isn’t using those granted permissions in the background when you’re done using it and log back into your network.

    • toynbee@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      9 hours ago

      I remember when Bluetooth started demanding location permissions. You’ll never convince me that it’s functionally required or provides any benefit other than furthering efforts to spy on the user.

      When it started being rolled out, I avoided any app or hardware that made that demand. Sadly, that’s no longer an option if I want any Bluetooth at all.

        • toynbee@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          52 minutes ago

          I believe it’s only required during the pairing process, but as the other observer pointed out, I don’t know much about it. If you’re able to circumvent the process, more power to you!

      • scrion@lemmy.world
        link
        fedilink
        English
        arrow-up
        17
        ·
        edit-2
        8 hours ago

        It’s not like Bluetooth started demanding location permissions, the conceptual model of the permission was revised: having access Bluetooth means an app could determine your location via a form of lateration.

        In earlier versions of smartphone operating systems, this was not transparent to users lacking the technical background, so Bluetooth also requiring location access is actually an attempt at making users aware of that. I’m not an iOS developer, so I can’t comment on iPhones, but on Android versions prior to 11, having access to Bluetooth meant an app would be able to determine your location.

        Today, you can require the permission ACCESS_FINE_LOCATION, which expresses that your app might use Bluetooth to obtain location information on Android. Also, if you’re just scanning for nearby devices to connect your app to, but don’t want users to be confused why your smart fridge app needs to know your precise location, you can declare a permission flag (neverForLocation) and Android will strip beacon information from the scan results, better asserting your intentions.

        So, overall: no, there is nothing nefarious going on, it was always possible to determine your location via Bluetooth, and the update to the permission model was an honest improvement that actually benefits you as user.

        Now, there are still plenty of shady apps around, and apps that are poorly written - don’t use those.

        • toynbee@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          8 hours ago

          I knew that someone would try to convince me. You won’t convince me.

          … Though your argument is pretty compelling.

          • llii@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            7
            ·
            7 hours ago

            I don’t think he wanted to convince you, he just explained the backgroundon how you can track locations with bluetooth.

  • astrsk@fedia.io
    link
    fedilink
    arrow-up
    32
    ·
    11 hours ago

    Pretty easy steps; get app you are interested in. Deny it access to things it doesn’t need when asked. If the app proceeds to not work until you enable, delete. Otherwise, enjoy app without the unnecessary permissions.

    • tibi@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 hours ago

      NetGuard just outright blocks network access. Apps can’t send tracking data if they are not able to access the servers. I’m using it in whitelist mode where I only allow access to apps that need it.

    • lemmeBe@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      9 hours ago

      That’s my approach with Rethink DNS. I get FOSS alternatives whenever acceptable for my use case, but isolate even them to only bare working minimum of outside connections.

    • meneervana@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      4
      ·
      9 hours ago

      Most apps literally don’t work right is you do not enable all location services

      • noodlejetski@lemm.ee
        link
        fedilink
        English
        arrow-up
        12
        ·
        9 hours ago

        11 out of 32 apps requesting location on my phone have the permission granted, because I actually need them to use location for one reason or another. the rest works perfectly fine with the permission disabled.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    32
    ·
    11 hours ago

    Don’t just give location access to any app that requests it, especially background location access.

    • helenslunch@feddit.nl
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 hours ago

      Years and years ago, they discovered that Google was still tracking your location, even with location disabled. That’s because Google created a surveillance network using your friends’ phones. Your friends’ phones would find local WiFi connections, and report them back to Google, along with associated GPS data. Then Google used this to make a sort of WiFi map. So now Google can tell where you are without ever getting any actual “location data”.

        • helenslunch@feddit.nl
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 hours ago

          Do you know that Pegasus software needs to have physical access to the device? And that it can’t recover data that doesn’t exist in the first place?

        • napoleonsdumbcousin@feddit.org
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          8 hours ago

          Pegasus spies on all the data on a phone. If a phone is really infected with that, then location access is the least of your worries. But this is not relevant to this post anyway, because 99,9% of people will never be a valid target for such high-level spyware.

          • humblebun@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            3
            ·
            9 hours ago

            Do you know what unlimited license means? 400 Russian journalists who fled to the Baltic states were compromised by Pegasus. This cancer is growing fast and if yesterday it wasn’t your business, today it is

            • K4mpfie@feddit.org
              link
              fedilink
              English
              arrow-up
              5
              arrow-down
              1
              ·
              9 hours ago

              Just make a proper threat level analysis. Are you a journalist or politically exposed person in a non-democratic or semi democratic system?
              No?
              Are you in a key position of a company or agency providing (for) critical infrastructure?
              No?
              Are you just a little shit, trolling on the internet?*
              Yes? Maybe just dial that back.

              Verdict: You are of no interest for a state sponsored Spy Software or some script kiddy trying to wreck your day.

              *Hypothetical situation. Does not necessarily apply to the OP.

              • humblebun@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                2
                ·
                8 hours ago

                non-democratic or semi democratic system?

                Am I right that you just called Estonia, Latvia, and Lithuania semi-democratic countries?

                • K4mpfie@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  7 hours ago

                  I would classify them as full democracies but if you want hard numbers I would check your countries score here

              • magic_smoke@links.hackliberty.org
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                8 hours ago

                The former is true, however anyone who’s ever looked at firewall logs will tell you plenty of skids are trying to get free domestic US IP addresses off of vulnerable home networks using automated means.

                That being said that has really has jack shit to do with personal privacy/security against state-scale dragnet surveillance.