Open utterances-bot opened 4 years ago
Everyone seems to have their own take on it. Just for reference, many studies don't actually measure anything! Besides a few cool-sounding assumptions (not to mention a fair amount of obvious hot air from NHTSA), there's a lot to keep track of. No one likes a complicated conversation...but I can't resist trying to help people understand the science behind a test, even if I may fail to clearly explain it. So, in an effort to simplify this discussion for people new to this kind of stuff, I'm going to take a bullet-point approach to the topic. Let's talk about about triangulation - basically, how do you tell what direction you're traveling.
In short: if you're in a building with a built-in Wi-Fi network, it's probably already being triangulated to within 5 feet. If you're in an open space without a built-in Wi-Fi signal, it's likely to be several floors away. It's not even important if the router/access point is directly "behind" you, but if it's directly "behind" something, whether an adjacent wall or some wall of a house or other object, it might be triangulated.
You'd think that Google would have included more information about the issue. It's a reasonable question though; after all, this is the company that gave us the "not all your data" status message last.
As many folks have noted, Google does not generate a fully 3D map for its WiFi networks, although some of the triangulated points do correspond well to the Triangulation model described in Section 7.2. To enable an overview of the Google hotspots, I have pre-filtered a top-level view of my home network using the triangulation model. If you would like to compare, compare the following examples with the mapped locations of my wi-fi networks. I would appreciate knowing if you find them visually better or not. If you have a more detailed approach, please share.
I am a regular user of I2P. I am actually a regular user of Tor. I am regular users of Gatecoin, Namecoin, Dogecoin, BitMessage and others. I have a jinja-based web app that stores on my local server a lot of my Bitcoin wallet addresses, as I tend to move around several crypto currencies a day. I operate an I2P-based mirror on my machine. It is not easy to keep track of all my users' p2p actions on the I2P network.
The cameras scan the user's keystrokes. I like this because the camera scans my keystrokes (which probably includes words I didn't mean to type in) and spit out a map of where I was looking. And the app that looks at this map compares it to previous pictures of the same road. It displays a more zoomed in map as a function of a smaller number of potential connections. It doesn't look for distances (I tested it once, and all it found was that I was in another town, not any house), but it does make the intersection look a lot bigger and makes the roads longer. Finally, the Google Maps version of the app makes the roads real.
Which is to say, as long as it's a thread, it's kind of of a thread. But what if this question isn't even a question? What if it's just another input to the main argument? "Why am I not getting past the lock screen?" is a long thread. But this question may have no input. If it has no input, it's just a question. If you're waiting, and the notifications and unlock screen are grayed out, maybe you just wish someone would be using Android at all. Maybe you'd like to just use your phone but a prominent reminder to turn it on tells you that something happened
For the last year, the apps have had information about the machines in play. While iCloud is still the most prominent way to keep track of your devices, Microsoft is changing the way the iOS app and the Windows 10 mobile app will communicate to your computer. Unlike the iOS app, the Windows 10 mobile app now uses the Wi-Fi network and device name to determine whether a device is in use. The gesture is fairly straightforward in theory. If a machine doesn't recognize your Wi-Fi network, you can see it shows up as a gray dot on the device screen (though it doesn't actually look like a gray dot on the device).
Staying authentic is a thread. Hiding from inattentive users, snooping on your activity, and selling your information are all threads. The security of your email account is similarly heavily reliant on thread-like properties. Think of this as the connective tissue that allows you to write a successful email, and that has a framework of security that prevents an attacker from working their way from one node to the next. It is a poor practice to constantly try to balance the positive properties of a threaded approach with the unavoidable dangers. To be sincere, that sounds counter-intuitive, but it's important.
Call me stupid. But if you had no luck with iPhone 5, you should try iPhone 5, Siri and Facetime. And if the first two didn't work, try your iPad. I never got Siri working on my iPad even though I downloaded an update from the Apple App Store. That's still not foolproof though. The usual symptoms of a faulty WiFi antenna? Roaring WiFi signal. That means your iPhone 5 or iPad is probably out of range of a nearby Wi-Fi router. Your neighbors and potential Roommates can use this to your advantage, so watch out. Don't let the Roommate ruin your fun because you lost connectivity.
Apple ID, for instance, sends DNS records to Apple's servers as part of its authentication service. That's a red flag, because it could suggest that third parties are spying on the Apple IDs of iPhone owners. Instead, that's handled by Apple itself. Aceh isn't the only state where WiFi scanning is used by antivirus companies to track threats. Sofware scans IP addresses of IoT devices to detect devices that haven't been set up correctly and malware — and it gets other companies to send its data back to them.
All previous comments were generated in this site:
Phone Tracking Threads. | fastpages
Phone Tracking Threads.
https://op07n.github.io/fastpages/markdown/2020/03/14/phone-tracking-threads.html