tag:blogger.com,1999:blog-7924773307171301256.post4346806886205562559..comments2024-03-28T00:18:09.974-04:00Comments on Just An Earth-Bound Misfit, I : Apple SpyComrade Misfithttp://www.blogger.com/profile/15404477636451308763noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-7924773307171301256.post-13932128741304817352011-04-24T17:14:34.754-04:002011-04-24T17:14:34.754-04:00Here's why Apple is doing this - or, why their...Here's why Apple is doing this - or, why their chief counsel says they're doing it. For customer service. And it's all anonymized data that's beamed back to Apple. Yeah.<br /><br /><a href="http://thenextweb.com/apple/2010/07/19/a-detailed-look-at-apples-letter-to-the-us-government-about-location-data-collection/" rel="nofollow">Apple's letter</a> and <a href="http://markey.house.gov/docs/applemarkeybarton7-12-10.pdf" rel="nofollow">pdf</a>.<br /><br />Interesting details. Cell tower data ( signal strengths, drops ) are logged, as are all WiFis used on the route. <br /><br />You can either assume this is an innocent network maintenance effort - or that it's a sinister mandate of the feds. The truth may be in between those extremes.Sarahhttps://www.blogger.com/profile/09991660841701835065noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-84351128323708555512011-04-23T13:46:12.208-04:002011-04-23T13:46:12.208-04:00All cell phones provide tracking data to cell phon...All cell phones provide tracking data to cell phone towers, it's a legal requirement (see: E911 requirement) for all cell phones sold in America. All of this data is immediately available to law enforcement with nothing more than a simple letter stating that you are a "person of interest", no warrant required (see: PEN register exemption, plus recent Supremes dancing on GPS tracking). <br /><br />The only difference here is that the iPhone for some reason also retained this data internally in its own memory. Apple says that this was a mistake and that they will fix it in a future release of the iPhone OS. So it goes. <br /><br />- Badtux the Privacy PenguinBadTuxhttps://www.blogger.com/profile/01345749557330760251noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-24955807327822080142011-04-23T10:12:02.924-04:002011-04-23T10:12:02.924-04:00This is happening on non-Apple devices too.This is happening on non-Apple devices too.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-41348918530079221312011-04-22T12:07:54.353-04:002011-04-22T12:07:54.353-04:00Sorry, had to correct a typo...
I seem to recall ...Sorry, had to correct a typo...<br /><br />I seem to recall seeing something on the news lately that Michigan (if I'm recalling correctly) is going to make it so that if you're stopped for any reason by traffic cops (even a burned out tail light), they will be authorized to remove data from your smartphone - and maybe from any computer you have in your possession (somebody may need to correct me on this), so they can see where you've been and what you've been doing. Yep, warrantless searches are here, no cause for suspicion needed. Nothing to see here; move along, Comrade....randompawseshttps://www.blogger.com/profile/12530108342884988224noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-13303645115507791572011-04-22T12:05:48.740-04:002011-04-22T12:05:48.740-04:00This comment has been removed by the author.randompawseshttps://www.blogger.com/profile/12530108342884988224noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-92036354131989890792011-04-21T20:22:29.014-04:002011-04-21T20:22:29.014-04:00After some searching here is a good explanation:
...After some searching here is a good explanation:<br /><br />http://tinyurl.com/3csd2ksMarchttps://www.blogger.com/profile/09680604981092904582noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-42271394317374441502011-04-21T19:24:26.286-04:002011-04-21T19:24:26.286-04:00I figure the GPS ability of smart phones uses basi...I figure the GPS ability of smart phones uses basic triangulation from local cel towers to pinpoint where the phone is, and the data could just be locally cached (instead of flushed) for future reference, since storage space is cheap. Not encrypting or auto flushing the data may have been a programing blind spot on the part of the coder(s). I generally don't equate laziness or stupidity with evil unless there is a definite trend.Marchttps://www.blogger.com/profile/09680604981092904582noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-63979477373665008872011-04-21T14:51:20.293-04:002011-04-21T14:51:20.293-04:00Cell phones have similar capability, not sure if t...Cell phones have similar capability, not sure if they are tracking it in the phone but the TPC can log it from the towers that phone checks in with.<br /><br />On one level it's a yawn. OF another level it's quite sinister as the data has great potential for misuse and abuse. When there is potential for abuse it generally means it's being abused!<br /><br />Eck!Eck!https://www.blogger.com/profile/13890237094647111653noreply@blogger.comtag:blogger.com,1999:blog-7924773307171301256.post-65931972846902677522011-04-21T12:16:37.036-04:002011-04-21T12:16:37.036-04:00I remember a long time ago when they announced tha...I remember a long time ago when they announced that the I-phones, which had this capability, would be useful to Homeland Security (or whatever they were calling it then) to track terrrrsstt.<br /><br />Thanks for following up.Cirzehttps://www.blogger.com/profile/07070125217972397204noreply@blogger.com