Hacker Newsnew | past | comments | ask | show | jobs | submit | henriklied's commentslogin

Our news org did an investigation into this as well, and also demonstrated how a simple HackRF could be used to fool most modern GPS receivers: https://nrkbeta.no/2017/09/18/gps-freaking-out-maybe-youre-t...


> The article assumes that the location data must have been collected because he gave an app permission to access his location. I bet they couldn’t figure out which app it was because it wasn’t an app.

I worked on this story (and the others, we're still publishing [1] [2]).

The dataset we bought from Tamoco didn't contain an app name for most of the data. So instead of guessing, we're open about the fact that we don't quite know. Which is sort of the issue here – there's not a lot of transparency around what is collected and by whom.

The Norwegian Data Protection Agency (DPA) has opened an investigation into Tamoco [2] after our first story, and they want to cooperate with the UK DPA.

[1] https://translate.googleusercontent.com/translate_c?depth=1&...

[2] https://translate.googleusercontent.com/translate_c?depth=1&...


You should search the dataset for government building coordinates to deanonymize politicians and that ought to really be a scandal worthy of legislation against mobile tracking once you air their dirty secrets e.g. suspected infidelity, leisure trips to brothels, etc.


It could be an app - we've had startups approach us to sell location data collected from apps so I wouldn't rule anything out at this point.


Feel free to contact me if this is something you want to talk about!


> I worked on this story

Having access to original NRK data, is it possible to deanonymize more people (try to check your home address, NRK HQ, etc), and ask them for a list of installed apps to check if all have one in common? Although it's questionable from privacy point of view, so probably better to pursue it in legal ways.


> is it possible to deanonymize more people

There are more stories coming in the next days and weeks which will touch more on this topic.


I’m cautious about what apps and services get access to my location and I feel like I have good control, but I don’t really have any idea of how carriers like Telenor and Telia handle my location data. Are you planning to touch on this or investigate it in the upcoming articles?


Not at this point, no. We went into detail on Telia and Telenors analytical platforms last year, though. Should still be up to date: https://nrkbeta.no/2019/10/11/telia-og-telenor-selger-analys...


Would love to speak to you about this. Can you send me an email? henrik.lied [at] nrk.no


Send you a mail from a newly created mail account.


Wow, this is interesting. I’ve sent you an email.


Understood. Google Translate does a formidable job of rendering the story in English, so I’ve resubmitted the translation.


We mostly treat those as off topic too except in rare cases. If a news story is significant enough to appear on HN, there is almost always (or soon will be) an English language article about it that can be submitted directly.

But I appreciate your desire to submit a relevant story and will leave that one unmoderated.


Also check out Lygte Info[1], the site of a Dane who checks chargers and batteries usually bought from the Chinese sites like Banggood and AliExpress. Spoiler: Not all of them are bad.

[1] https://lygte-info.dk/info/indexUSB%20UK.html


I wouldn't doubt that Walmart, between their acquisition of jet.com and intense focus on competing with Amazon in the e-commerce arena is taking drone delivery services very seriously right now. They are already trying nearly everything else.


I just tested it on a Samsung Galaxy S3, in several forms (as src in link, script, img, video and object elements, as well as the href in an a element). Nothing happened here.


Android Central reported that the (verizon) S3 was not vulnerable to this attack.

http://www.androidcentral.com/major-security-vulnerability-s...

Edit: Found some postings on xda-dev that the GS3 is vulnerable. Could depend on firmware version, I know a system update came out recently on Sprint.


Smooth Streaming is certainly a great piece of technology, and thanks to the guys at Code Shop, it now works on several devices and using nginx, Apache and lighttpd: http://smoothstreaming.code-shop.com/trac


Netflix streaming is like the bittorrent protocol (lots of participant hosts and lots of chunked fetches). See this: http://labs.mudynamics.com/2011/04/07/mommy-netflix-is-eatin...


Great stuff!

In curious: What do you think about exposing this service via WebSockets? Would that make it even faster?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: