How People Broadcast Their Locations Without Meaning To

Smart phones include geotagging features that many people aren’t aware of.

People were up in arms this week about the privacy implications of news that the iPhone gathers location information and stores it in a file on the user’s computer. But experts say that smart-phone owners are unknowingly taking a much bigger risk with information about where they go all day. During a presentation at the computer security conference Source Boston, Ben Jackson of Mayhemic Labs and Larry Pesce, a senior security consultant with NWN, described the way photos taken by many phones are routinely encoded with latitude and longitude tags. When users post those photos online through services such as TwitPic, they often expose much more personal data than they realize.

“It is definitely true that folks don’t [understand] the risk,” says Jackson.

For example, by looking at the location metadata stored with pictures posted through one man’s anonymous Twitter account, the researchers were able to pinpoint his likely home address. From there, by cross-referencing this location with city records, they found his name. Using that information, the researchers went on to find his place of work, his wife’s name, and information about his children.

A few smart phones, such as the BlackBerry, leave the geotagging feature turned off by default. In many devices, however, photos are tagged with this information unless users to go in and disable the feature themselves. Continue reading…

Related Posts

Anti SOPA/PIPA Protest: How it happened and what you can do The protest against Stop Online Piracy Act (SOPA) and Protect Intellectual Property Act (PIPA) has come and gone, but the fight is just getting starte...
Why security standards are Critical for the Cloud Everyone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? Howe...
Join EFF in Standing up Against Internet Censorship Over the past few weeks, we here at EFF have watched as whistleblowing website WikiLeaks has fueled an emotionally charged debate about the secrecy ...
Android App Permissions Dissected Based on our recent research and feedback from our users, we know that Android permissions can sometimes be confusing. Often it is hard to tell what d...
Open source software fundamental to success in the mobile and consumer electronics markets By Ari Rauch, Linaro board member: Today more than ever before, our industry views open source software (OSS) as fundamental to success in the mobile ...
FSF position on GPLv2 & current App Store terms This was written by Brett smith on the VLC development mailing list. Brett is the Licensing Compliance Engineer with the Free Software Foundation: Sal...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*