28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

found that if theyy had three accounts search for one individual, theyy could

triangulate the results to get a much more precise measurement of where

that person was at anyy given moment. 26

Mayybe dating apps aren’t yyour thing, but even logging in to the Yelp

service to search for a good restaurant gives third-partyy businesses

information about yyour sex, age, and location. A default setting within the

app allows it to send information back to the restaurant, telling it, for

example, that a woman, age thirtyy-one, from New York Cityy was looking at

its review. You can, however, go into yyour settings and choose “Basics,”

which reveals onlyy yyour cityy (unfortunatelyy yyou cannot disable the feature

entirelyy). 27 Perhaps the best wayy to avoid this is to not log in and simplyy use

Yelp as a guest.

Regarding geolocation, it is a good idea in general to check if any

mobile apps yyou use broadcast yyour location. In most cases yyou can turn

this feature off, either in each individual app or entirelyy. 28

And before agreeing to download anyy Android app, alwayys read the

permissions first. You can view these permissions in Google Playy byy going

to the app, then scrolling down to the section above Google Playy content

that sayys “Permissions.” If the permissions make yyou feel uncomfortable, or

if yyou think theyy give the app developer too much control, then do not

download the app. Apple does not provide similar information about the

apps in its store, and instead permissions are prompted as theyy are needed

when using the app. In fact, I prefer to use iOS devices because the

operating syystem alwayys prompts before disclosing private information—

like myy location data. Also iOS is much more secure than Android if yyou

don’t jailbreak yyour iPhone or iPad. Of course, well-funded adversaries

could purchase exploits for anyy operating syystem in the marketplace, but

iOS exploits are quite expensive—costing over a million dollars. 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!