Give permission. Don't give permission. They know where you are anyway
-
An amazing bit of digital detective work here. Send like Linux mobile is your only off ramp from being exhaustively tracked
-
-
[email protected]replied to [email protected] last edited by
All HTTP requests include your ip address, you don't "consent" to giving it to anybody. You can geolocate somebody based on ip address but it won't be very accurate
-
[email protected]replied to [email protected] last edited by
Even with Linux it wouldn't be that safe, if apps were doing this crap.
-
[email protected]replied to [email protected] last edited by
Use a VPN. Problem solved.
-
[email protected]replied to [email protected] last edited by
Make sure you disable or properly configure webrtc. Even with a VPN it will leak your true IP address.
Check here.
-
[email protected]replied to [email protected] last edited by
We just have to stop using the internet at this point
-
[email protected]replied to [email protected] last edited by
This problem solved, but whenever you change your network or IP and then periodically, your phone will report to Firebase, so you can receive push notifications.
You can block those with software that simulates a local VPN with a filter, but you won't get any more push notifications. Now push notifications are not just the ones you see. Some apps use invisible ones to get infos they need to work.
-
[email protected]replied to [email protected] last edited by
Using a VPN just moves the trust to another middleman.
-
[email protected]replied to [email protected] last edited by
That VPN provider will then know ALL the connections you make. Almost worse than just using the Internet normally.
-
[email protected]replied to [email protected] last edited by
Not the magic bullet people think they are. Oh, and you can't turn it off, so you'll have to take the loss in network speed on absolutely everything. And better know how to configure each device so it doesn't go ahead and check leak your IP anyways, which also restricts choice of devices you use. Cause remember, if any device on your network ever connects to the net without the VPN, then your anonymity just went out the window.
-
[email protected]replied to [email protected] last edited by
You can set up wireguard vpn on a tiny instance in Amazon or Google, and bounce traffic through that one. Then you control what gets logged (Amazon may have logs over all outgoing connections from all instances somewhere though).
-
[email protected]replied to [email protected] last edited by
Is there any straightforward way of stopping this besides dropping off the grid?
-
[email protected]replied to [email protected] last edited by
it's been known for a long time that there is enough identifiable information in a "normal" person's internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information
question is, how is this being abused
-
[email protected]replied to [email protected] last edited by
Route all or traffic through tor. Never log into anything. Never use the same identity twice. Ahh and live in a hut in the woods never going to shops or cities that have security cameras.
-
[email protected]replied to [email protected] last edited by
...where are chains allowed to abuse security camera footage for ad tracking?
-
[email protected]replied to [email protected] last edited by
I think it's more: "Don't use a smartphone". It'll send those requests through any internet connection. No matter if it's a VPN.
-
[email protected]replied to [email protected] last edited by
Does this happen to users in the EU? Itβs highly illegal to gather data without consent here obviously. Even processing other data to derive location means processing data for purpose thatβs different from one that was consented to (if they tried to get consent at all). There are big companies implicated here so itβd be easy to fine them into submission in jurisdictions that allow it.
-
[email protected]replied to [email protected] last edited by
The sample data shared in the article includes
"c": "ES", // Country code,
ES is usually used for Spain, so it looks like these tests were run from within the EU.
-
[email protected]replied to [email protected] last edited by
I forgot I'm in a minority of people running a properly secure degoogled ROM.
-
[email protected]replied to [email protected] last edited by
Bunnings in Australia until very recently and u have basically 0 protections in the states.