The blog post encourages readers to experiment with a provided Python script that demonstrates how easily location can be estimated using publicly available Wi-Fi network data and the Wigle.net API. By inputting the BSSIDs (unique identifiers) of nearby Wi-Fi networks, even without connecting to them, the script queries Wigle.net and returns a surprisingly accurate location estimate. The post highlights the privacy implications of this accessible technology, emphasizing how readily available information about wireless networks can be used to pinpoint someone's location with a simple script, regardless of whether location services are enabled on a device. This reinforces the previous post's message about the pervasiveness of location tracking.
Jeff Geerling's blog post highlights Beidou Position System (BPS), China's independently developed global navigation satellite system, as a lesser-known alternative to GPS. He details its development, global coverage, and increasing accuracy, emphasizing its potential as a backup or even primary navigation system, particularly for those needing to operate independently of US-controlled infrastructure. Geerling shares his experience testing BPS receivers, noting its comparable performance to GPS in his basic experiments and the growing availability of BPS-compatible devices. He concludes by advocating for greater awareness of BPS as a viable option in the GNSS landscape.
HN commenters discuss the viability and practicality of BPS, noting it's largely theoretical and faces significant hurdles. Several point out the immense infrastructure investment required for terrestrial positioning systems like BPS, especially compared to the established satellite-based GPS. Some question the accuracy claims and highlight potential interference issues in dense urban environments. Others express skepticism about BPS's resistance to jamming and spoofing, crucial for critical infrastructure. A few comments mention Loran-C as a more mature terrestrial alternative, although it has its limitations. Overall, there's a consensus that while intriguing, BPS lacks the development and backing to become a serious competitor to GPS in the foreseeable future.
OSMCal is a comprehensive, crowdsourced calendar of OpenStreetMap-related events worldwide. It aggregates conferences, workshops, mapathons, social gatherings, and other activities relevant to the OSM community, allowing users to browse events by location, date, and keywords. The calendar aims to facilitate connection and collaboration within the OSM ecosystem by providing a central resource for discovering and promoting these events. Users can submit their own events for inclusion, ensuring the calendar stays up-to-date and reflects the vibrant activity of the OpenStreetMap community.
Hacker News users discussed the usefulness of the OpenStreetMap Calendar (OSMCal) for discovering local mapping events. Several commenters expressed appreciation for the resource, finding it valuable for connecting with the OSM community and learning about contributing. Some highlighted the importance of in-person events for fostering collaboration and knowledge sharing within the OSM ecosystem. Others wished for improved filtering or search capabilities to refine event discovery, particularly by region or specific interests. The calendar's role in promoting OSM and coordinating community efforts was generally seen as positive. A few users also mentioned alternative or supplementary resources, such as weeklyOSM and the OSM forum, for staying informed about OpenStreetMap activities.
Tim investigated the precision of location data used for targeted advertising by requesting his own data from ad networks. He found that location information shared with these networks, often through apps on his phone, was remarkably precise, pinpointing his location to within a few meters. He successfully identified his own apartment and even specific rooms within it based on the location polygons provided by the ad networks. This highlighted the potential privacy implications of sharing location data with apps, demonstrating how easily and accurately individuals can be tracked even without explicit consent for precise location sharing. The experiment revealed a lack of transparency and control over how this granular location data is collected, used, and shared by advertising ecosystems.
HN commenters generally agreed with the article's premise that location tracking through in-app advertising is pervasive and concerning. Some highlighted the irony of privacy policies that claim not to share precise location while effectively doing so through ad requests containing latitude/longitude. Several discussed technical details, including the surprising precision achievable even without GPS and the potential misuse of background location data. Others pointed to the broader ecosystem issue, emphasizing the difficulty in assigning blame to any single actor and the collective responsibility of ad networks, app developers, and device manufacturers. A few commenters suggested potential mitigations like VPNs or disabling location services entirely, while others expressed resignation to the current state of surveillance. The effectiveness of "Limit Ad Tracking" settings was also questioned.
Summary of Comments ( 50 )
https://news.ycombinator.com/item?id=43716704
Hacker News users generally agreed with the article's premise, expressing concern over the ease with which location can be approximated or even precisely determined using readily available data and relatively simple techniques. Several commenters shared their own experiences replicating the author's methods, often with similar success in pinpointing locations. Some highlighted the chilling implications for privacy, particularly in light of data breaches and the potential for malicious actors to exploit this vulnerability. A few offered suggestions for mitigating the risk, such as VPN usage or scrutinizing browser extensions, while others debated the feasibility and effectiveness of such measures. Some questioned the novelty of the findings, pointing to prior discussions on similar topics, while others emphasized the importance of continued awareness and education about these privacy risks.
The Hacker News post titled "Everyone knows your location, Part 2: try it yourself and share the results" generated a moderate amount of discussion with a mix of reactions and insights related to the original article's claims about location tracking.
Several commenters shared their own experiences attempting the location tracking techniques described in the article, with varying degrees of success. Some reported being able to pinpoint locations with surprising accuracy, while others found the methods less effective or inconsistent. This led to a discussion about the reliability and practicality of these techniques in real-world scenarios.
A key point of discussion revolved around the ethical implications of readily accessible location tracking methods. Commenters debated the potential for misuse and the need for greater awareness and control over personal location data. Some argued for stricter regulations and increased transparency from companies collecting and utilizing location information.
Technical details of the tracking methods were also examined. Commenters discussed the specifics of IP address geolocation, WiFi positioning, and other techniques, including their limitations and potential vulnerabilities. Some commenters with expertise in networking and security offered insights into the accuracy and feasibility of these methods, pointing out factors that could influence the results.
The conversation touched upon the trade-offs between convenience and privacy in the context of location-based services. Commenters acknowledged the benefits of location services for navigation, personalized recommendations, and other applications, but also expressed concerns about the potential for surveillance and data breaches.
Some commenters also discussed potential mitigations and defenses against unwanted location tracking. Suggestions included using VPNs, disabling location services on devices, and being mindful of the permissions granted to apps.
Finally, a few commenters questioned the overall novelty of the information presented in the article, suggesting that the methods described were already well-known within the security and privacy community. However, they acknowledged the value in raising public awareness about these issues and making them accessible to a wider audience.