Morys@lemmy.ml to Technology@lemmy.worldEnglish · edit-210 months agoGive permission. Don't give permission. They know where you are anywaytimsh.orgexternal-linkmessage-square62linkfedilinkarrow-up1384arrow-down16file-textcross-posted to: privacy@lemmy.mlplanetdyne@fed.dyne.orgtechnology@lemmy.world
arrow-up1378arrow-down1external-linkGive permission. Don't give permission. They know where you are anywaytimsh.orgMorys@lemmy.ml to Technology@lemmy.worldEnglish · edit-210 months agomessage-square62linkfedilinkfile-textcross-posted to: privacy@lemmy.mlplanetdyne@fed.dyne.orgtechnology@lemmy.world
An amazing bit of digital detective work here. Seems like Linux mobile is your only off ramp from being exhaustively tracked
minus-squarejimmy90@lemmy.worldlinkfedilinkEnglisharrow-up36·10 months agoit’s been known for a long time that there is enough identifiable information in a “normal” person’s internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information question is, how is this being abused
it’s been known for a long time that there is enough identifiable information in a “normal” person’s internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information
question is, how is this being abused