Urban75 Home About Offline BrixtonBuzz Contact

Apple's iPhone <eta: and other smartphones?> tracks users every movement

With triangulation, the accuracy is much better than that. In cities, it's nearly as good as GPS.
 
*I don't know how the iPhone works wrt actual GPS but cell locations typically have an accuracy of ~2000m.
That's complete nonsense. I often don't even bother turning on GPS in London because the cell tower triangulation is so accurate. It's clearly a different story out in the wilds, though.
 
With triangulation, the accuracy is much better than that. In cities, it's nearly as good as GPS.

Google maps can nearly always get us within 200m of where we are on the canals, nowhere near a city. That's with no GPS, just a 3G internet connection. I'll test it when we get to some really isolated places and see how it does.
 
That's complete nonsense. I often don't even bother turning on GPS in London because the cell tower triangulation is so accurate. It's clearly a different story out in the wilds, though.
Or anywhere that isn't London. I get a radius of over a mile at home in suburbia. I know that Google's location service doesn't use triangulation though - just CID and LAC.

It usually looks like this:

googlemapsandroid.jpg


Not mine, I just googled 'complete nonsense'.
 
When I was in NYC I was getting very accurate figures without GPS, especially if you have Wi-Fi turned on.
 
Yes, but that's Wi-Fi - I believe there's also an iPhone database for that - which has a much lower range (Google assumes about 100m).
 
Yes, but that's Wi-Fi - I believe there's also an iPhone database for that - which has a much lower range (Google assumes about 100m).
Cell locations can be very accurate, down to just 50 metres or less. That is a simple fact.
 
The only way that'd be possible from a cell is with femtocell or environmentally limited cell stations, e.g. a repeater in a tunnel.
 
Use the source Luke

If you grab the provided application source code and modify it (the app grids the data every few hundred metres and only provides time resolution down to a week) then you can easily plot precise locations in both space and time.

However, just looking at my own 'map' the data are inaccurate. At best one can say subject X was in this area of a city around time T. My own map fails miserably to identify the locations where I'm most frequently to be found. Even looking at the data recorded in central London (with best cell tower triangulation conditions) a stalker is going to be very bored and/or confused hanging around locations I seldom if ever visit. Many of the datapoints are out by hundreds of metres, some by as much as tens of km (eg places I've never been). Some locations I know I've been on a given date are missed out entirely (eg entire countries or the fact I'm in a particular city, let alone at the resolution of a district/street/house).

For use in legal proceedings it should be straightforward to demonstrate it can't be trusted.

However, that doesn't excuse Apple for [A] surreptitiously collecting the data and not being up front about it, and as importantly storing said data effectively in the clear so it can easily be harvested by malware/dodgy websites/etc from the mobile device and/or the computer it syncs to. They could easily have encrypted it both in the synced backup image and on the mobile device (with app access via a suitable API).

Apple moved the datafile to make it accessible to apps in iOS4 as they made other API changes at the time which would otherwise have prevented apps that really need this data from being able to access it. Unfortunately this had the effect of making the data both easily accessible on backups and to 'forensic' tools.

Interestingly there's an on going story about police in the US using commercial forensic devices to harvest this sort of data in warrant-less 'fishing trips' as part of 'random' driver stop and searches (they scan the driver's mobile phone or other personal electronic devices found in the car):

http://news.cnet.com/8301-17938_105-20055431-1.html?tag=mncol;txt

Similar devices are doubtless used 'randomly' at border control/security/customs.

I'm guessing the device concerned (and any other forensic device) snaffles this location file, plus wifi base station data (which is also cached over time) and GPS/time metadata from photos on the phone. All three sources together could be used to plot a more accurate map of where the phone has been...

Some solutions? Jailbreak your phone and symlink the datafile to /dev/null. Or wipe the phone frequently and don't restore it (bye bye paid apps). Or use a dumber phone. Or one for which you have access to the complete source code.
 
everyone will be praising it when it's used to solve a murder or some shit, ott reactions from some.
 
How could it be used to solve a murder? If the police need the data on someone, they can have it. This is of no use to officialdom*

But stalking? There's an app for that ...



*unless they're trying to circumvent the need for a court order via mass trojans
/paranoid conspiracy.
 
everyone will be praising it when it's used to solve a murder or some shit, ott reactions from some.

That's what warrants (judicially reviewed) for the police to obtain cell tower positional data from telco's are for.

If you look at the raw, 'precise' data on an iphone (or backup), you'll soon realise that due to numerous spurious datapoints and lack of accuracy that the only potential use in a court of law for this data would be for a miscarriage of justice.
 
If you give them access to your login.

If you've got a jealous spouse, there's probably reason for it and you need to sort that out tbf...
 
It's a bit weird. If they were planning to data-mine it, surely it'd make more sense to collect it server-side the way everybody else does?

Wondering if someone left some debugging code in the live build ...
 
Encrypting your backups (simple checkbox in iTunes) gets over these worries though doesn't it?

At the expense of a slower backup, yes, some. Doesn't touch the original, still clearly accessible file on the iphone itself, though. Of course if you share the computer with others and don't routinely use separate accounts, or leave those accounts logged in and add the password to your keychain (and unlock that at login) then others or malware can still access it. The most effective solution for the paranoid might well be to jailbreak the iphone and symlink the file to /dev/null.
 
It's a bit weird. If they were planning to data-mine it, surely it'd make more sense to collect it server-side the way everybody else does?

Wondering if someone left some debugging code in the live build ...

Yup that's why I don't see the burglar angle as that big a deal (in a practical sense not privacy sense that is), the chances of it happening are very very low.

This data is a marketing dream, the chances of it being sold or commercially exploited are hugely bigger than coming home and finding your house ransacked due to it...
 
It's a bit weird. If they were planning to data-mine it, surely it'd make more sense to collect it server-side the way everybody else does?

Wondering if someone left some debugging code in the live build ...

It would be illegal if they were storing it remotely.

It's not an error - the data is copied to a new iPhone automatically. It's there deliberately. (Link somewhere ^^ back there.)
 
iPhone Tracking Is All A Big Mistake, Says Researcher

Looks like Apple's counter PR drive is gearing up:

The iPhone tracking issue that’s causing a big privacy stink isn’t new and isn’t really tracking users, says an iOS forensics researcher.

It’s actually a data file that is used internally by the iPhone to do things like geo-tag photos, and it’s been in iOS for a long time (in a different form).

What’s new is a nifty extraction tool called iPhoneTracker that pulls the data off your hard drive and makes a striking map out of it. iPhoneTracker was released this week at O’Reilly’s Where 2.0 conference, causing a huge outcry about privacy and prompting U.S. Senator Al Franken to write to Steve Jobs.
 
Speculation

Summary: Skyhook et al too expensive so Apple might be letting customer handsets do the scanning and help build their own wifi-geolocation database:

http://www.f-secure.com/weblog/archives/00002145.html

The phone certainly stores wifi geolocation data (estimated latitude, longitude and timestamps along with altitude, speed, confidence, horizontal accuracy and vertical accuracy) in a similarly accessible database:

http://www.freedom-to-tinker.com/blog/wclarkso/tracking-your-every-move-iphone-retains-extensive-location-history

and harvesting your lat/long/time from the JPEG EXIF metadata on your phone is trivial.

What fun the police could have with a device that does all three and profiles the movement of the phone. Fishing trips to catch speeding drivers? "Now if I can just borrow your phone a minute, Mr Clarkson", as someone hinted at elsewhere.
 
Back
Top Bottom