The blog post encourages readers to experiment with a provided Python script that demonstrates how easily location can be estimated using publicly available Wi-Fi network data and the Wigle.net API. By inputting the BSSIDs (unique identifiers) of nearby Wi-Fi networks, even without connecting to them, the script queries Wigle.net and returns a surprisingly accurate location estimate. The post highlights the privacy implications of this accessible technology, emphasizing how readily available information about wireless networks can be used to pinpoint someone's location with a simple script, regardless of whether location services are enabled on a device. This reinforces the previous post's message about the pervasiveness of location tracking.
The post "Everyone knows all the apps on your phone" argues that the extensive data collection practices of mobile advertising networks effectively reveal which apps individuals use, even without explicit permission. Through deterministic and probabilistic methods linking device IDs, IP addresses, and other signals, these networks can create detailed profiles of app usage across devices. This information is then packaged and sold to advertisers, data brokers, and even governments, allowing them to infer sensitive information about users, from their political affiliations and health concerns to their financial status and personal relationships. The post emphasizes the illusion of privacy in the mobile ecosystem, suggesting that the current opt-out model is inadequate and calls for a more robust approach to data protection.
Hacker News users discussed the privacy implications of app usage data being readily available to mobile carriers and how this data can be used for targeted advertising and even more nefarious purposes. Some commenters highlighted the ease with which this data can be accessed, not just by corporations but also by individuals with basic technical skills. The discussion also touched upon the ineffectiveness of current privacy regulations and the lack of real control users have over their data. A few users pointed out the potential for this data to reveal sensitive information like health conditions or financial status based on app usage patterns. Several commenters expressed a sense of resignation and apathy, suggesting the fight for data privacy is already lost, while others advocated for stronger regulations and user control over data sharing.
Even if no one reads your blog, it's still valuable. Writing clarifies your thinking, solidifies your understanding of a topic, and acts as a personal record of your intellectual journey. It can serve as a sandbox for experimenting with ideas, a portfolio to showcase skills, and a springboard for future projects. Essentially, blogging is an act of learning and self-improvement, with the potential bonus of connecting with an audience down the line.
HN commenters largely agree with the author's premise that blogging, even without a large audience, has value. Several highlight the benefits of writing as a way to clarify thinking, consolidate knowledge, and improve writing skills. Some suggest that a blog can serve as a personal knowledge base, searchable archive, or a way to track personal growth. A few practical suggestions include focusing on niche topics and promoting the blog through relevant communities. The idea of writing primarily for oneself, with the potential for an audience as a secondary benefit, is a recurring theme. Some commenters share their own experiences of low-traffic blogs providing unexpected value, like attracting job offers or connecting with like-minded individuals. The overall sentiment is that the intrinsic rewards of blogging often outweigh the pressure of building a large readership.
Former tech CEO and founder of online invitation company Evite, Al Lieb, is suing to have records of his 2016 domestic violence arrest expunged from the internet. Despite charges being dropped and the case dismissed, Lieb argues that the persistent online presence of his arrest record unfairly damages his reputation and career prospects. He's targeting websites like Mugshots.com that publish arrest information, claiming they profit from this information and refuse to remove it even after legal proceedings conclude. Lieb believes individuals have a right to privacy and to move on from past mistakes when charges are dropped.
Hacker News commenters largely discuss the legal and ethical implications of attempting to remove public arrest records from the internet. Several express skepticism about the plaintiff's chances of success, citing the importance of public access to such information and the established difficulty of removing content once it's online (the Streisand effect is mentioned). Some debate the merits of his arguments regarding potential harm to his reputation and career, while others suggest alternative strategies like focusing on SEO to bury the negative information. A few comments highlight the tension between individual privacy rights and the public's right to know, with some arguing that the nature of the alleged crime should influence the decision of whether to unseal or remove the record. There's also discussion about the potential for abuse if such removals become commonplace, with concerns about powerful individuals manipulating public perception. A common thread is the acknowledgment that the internet has fundamentally changed the landscape of information accessibility and permanence.
Summary of Comments ( 50 )
https://news.ycombinator.com/item?id=43716704
Hacker News users generally agreed with the article's premise, expressing concern over the ease with which location can be approximated or even precisely determined using readily available data and relatively simple techniques. Several commenters shared their own experiences replicating the author's methods, often with similar success in pinpointing locations. Some highlighted the chilling implications for privacy, particularly in light of data breaches and the potential for malicious actors to exploit this vulnerability. A few offered suggestions for mitigating the risk, such as VPN usage or scrutinizing browser extensions, while others debated the feasibility and effectiveness of such measures. Some questioned the novelty of the findings, pointing to prior discussions on similar topics, while others emphasized the importance of continued awareness and education about these privacy risks.
The Hacker News post titled "Everyone knows your location, Part 2: try it yourself and share the results" generated a moderate amount of discussion with a mix of reactions and insights related to the original article's claims about location tracking.
Several commenters shared their own experiences attempting the location tracking techniques described in the article, with varying degrees of success. Some reported being able to pinpoint locations with surprising accuracy, while others found the methods less effective or inconsistent. This led to a discussion about the reliability and practicality of these techniques in real-world scenarios.
A key point of discussion revolved around the ethical implications of readily accessible location tracking methods. Commenters debated the potential for misuse and the need for greater awareness and control over personal location data. Some argued for stricter regulations and increased transparency from companies collecting and utilizing location information.
Technical details of the tracking methods were also examined. Commenters discussed the specifics of IP address geolocation, WiFi positioning, and other techniques, including their limitations and potential vulnerabilities. Some commenters with expertise in networking and security offered insights into the accuracy and feasibility of these methods, pointing out factors that could influence the results.
The conversation touched upon the trade-offs between convenience and privacy in the context of location-based services. Commenters acknowledged the benefits of location services for navigation, personalized recommendations, and other applications, but also expressed concerns about the potential for surveillance and data breaches.
Some commenters also discussed potential mitigations and defenses against unwanted location tracking. Suggestions included using VPNs, disabling location services on devices, and being mindful of the permissions granted to apps.
Finally, a few commenters questioned the overall novelty of the information presented in the article, suggesting that the methods described were already well-known within the security and privacy community. However, they acknowledged the value in raising public awareness about these issues and making them accessible to a wider audience.