Give permission. Don't give permission. They know where you are anyway
-
T [email protected] shared this topic
-
-
-
-
Make sure you disable or properly configure webrtc. Even with a VPN it will leak your true IP address.
Check here.
-
We just have to stop using the internet at this point
-
-
-
That VPN provider will then know ALL the connections you make. Almost worse than just using the Internet normally.
-
-
You can set up wireguard vpn on a tiny instance in Amazon or Google, and bounce traffic through that one. Then you control what gets logged (Amazon may have logs over all outgoing connections from all instances somewhere though).
-
Is there any straightforward way of stopping this besides dropping off the grid?
-
it's been known for a long time that there is enough identifiable information in a "normal" person's internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information
question is, how is this being abused
-
Route all or traffic through tor. Never log into anything. Never use the same identity twice. Ahh and live in a hut in the woods never going to shops or cities that have security cameras.
-
...where are chains allowed to abuse security camera footage for ad tracking?
-
-
Does this happen to users in the EU? Itβs highly illegal to gather data without consent here obviously. Even processing other data to derive location means processing data for purpose thatβs different from one that was consented to (if they tried to get consent at all). There are big companies implicated here so itβd be easy to fine them into submission in jurisdictions that allow it.
-
The sample data shared in the article includes
"c": "ES", // Country code,
ES is usually used for Spain, so it looks like these tests were run from within the EU.
-
I forgot I'm in a minority of people running a properly secure degoogled ROM.
-
Bunnings in Australia until very recently and u have basically 0 protections in the states.