Morys@lemmy.ml to Technology@lemmy.worldEnglish · 1 year agoGive permission. Don't give permission. They know where you are anywaytimsh.orgexternal-linkmessage-square62linkfedilinkarrow-up1384arrow-down16file-textcross-posted to: [email protected][email protected][email protected][email protected]
arrow-up1378arrow-down1external-linkGive permission. Don't give permission. They know where you are anywaytimsh.orgMorys@lemmy.ml to Technology@lemmy.worldEnglish · 1 year agomessage-square62linkfedilinkfile-textcross-posted to: [email protected][email protected][email protected][email protected]
An amazing bit of digital detective work here. Seems like Linux mobile is your only off ramp from being exhaustively tracked
minus-squarejimmy90@lemmy.worldlinkfedilinkEnglisharrow-up36·1 year agoit’s been known for a long time that there is enough identifiable information in a “normal” person’s internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information question is, how is this being abused
it’s been known for a long time that there is enough identifiable information in a “normal” person’s internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information
question is, how is this being abused