Tag Archive | Mobile device

Apple Filed Patent for Mobile Device Tracking

Apple Lied: Filed Patent for Mobile Device Tracking, Infosec Island, Friday, April 29, 2011

Apple’s claim that the geolocation tracking of its customers via a stealth file maintained in devices running the iOS operating system are, well, “patently” false. … Apple filed for a patent in September of 2009 titled “Location Histories for Location Aware Devices” with the intent to develop services based around the company’s ability to locate and track mobile devices running the iOS operating system. The abstract of the patent reads as follows:

“A location aware mobile device can include a baseband processor for communicating with one or more communication networks, such as a cellular network or WiFi network. In some implementations, the baseband processor can collect network information (e.g., transmitter IDs) over time. Upon request by a user or application, the network information can be translated to estimated position coordinates (e.g., latitude, longitude, altitude) of the location aware device for display on a map view or for other purposes. A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view.” …

For full text of the article, via Apple Lied: Filed Patent for Mobile Device Tracking.

Third Party Application Forensics on Apple Mobile Devices

ABSTRACT: Forensics on mobile devices is not new. Law enforcement and academia have been performing forensics on mobile devices for the past several years. Forensics on mobile third party applications is new. There have been third party applications on mobile devices before today, but none that provided the number of applications available in the iTunes app store. Mobile forensic software tools predominantly addresses “typical” mobile telephony data – contact information, SMS, and voicemail messages. These tools overlook analysis of information saved in third-party apps. Many third-party applications installed in Apple mobile devices leave forensically relevant artifacts available for inspection. This includes information about user accounts, timestamps, geolocational references, additional contact information, native files, and various media files. This information can be made readily available to law enforcement through simple and easy-to-use techniques.

For full text of the article, visit Third Party Application Forensics on Apple Mobile Devices.

Citation: Alex Levinson, Bill Stackpole, Daryl Johnson, “Third Party Application Forensics on Apple Mobile Devices,” hicss, pp.1-9, 2011 44th Hawaii International Conference on System Sciences, 2011

Nudging Users Towards Privacy on Mobile Devices

ABSTRACT: By allowing individuals to be permanently connected to the Internet, mobile devices ease the way information can be accessed and shared online, but also raise novel privacy challenges for end users. Recent behavioral research on “soft” or “asymmetric” paternalism has begun exploring ways of helping people make better decisions in different aspects of their lives. We apply that research to privacy decision making, investigating how soft paternalistic solutions (also known as nudges) may be used to counter cognitive biases and ameliorate privacy-sensitive behavior. We present the theoretical background of our research, and highlight current industry solutions and research endeavors that could be classified as nudging interventions. We then describe our ongoing work on embedding soft paternalistic mechanisms in location sharing technologies and Twitter privacy agents.

For full text of the article, click here.

Rebecca Balebako, Pedro G. Leon, Hazim Almuhimedi, Patrick Gage Kelley, Jonathan Mugan, Alessandro Acquisti, Lorrie Faith Cranor and Norman Sadeh. 2011. Nudging Users Towards Privacy on Mobile DevicesWorkshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices (PINC at CHI-11). Vancouver, Canada.

So actually, Apple isn’t recording your (accurate) iPhone location

So actually, Apple isn’t recording your (accurate) iPhone location

by Peter Batty, GeoThought, April 23, 2011

So over the past couple of days there has been mass hysteria, questions in Congress, etc, over the fact that Apple is apparently recording all the locations you’ve been to with your iPhone without telling you, and storing it without encryption. The news was broken by my friend Pete Warden at Where 2.0 last week and has escalated rapidly since then. As someone who publishes their location anyway (you can see where I am right now by checking the right hand panel on my blog) I was less concerned about this than many, though I agree that Apple should make it clear that they are recording this information and give you the option to turn it off, plus it should be stored more securely.

via geothought: So actually, Apple isn’t recording your (accurate) iPhone location.

The Power of GIS and SMS Alert Services

The Power of GIS and SMS Alert Services

Written by ASM_Admin, Asian Surveying & Mapping, Thursday, 23 December 2010 09:34

Communicating important messages can be triggered through geographic information systems (GIS) activities. Using mobile devices, short message service (SMS) occur as text messages and often originate automatically. Deteriorating weather forecasts, tsunami alerts, flood events and pollution impacts are examples of events that can be communicated to mobile devices to warn and inform people. These messages tend to be short and are intended to cause immediate action. Short message services are more commonly known as SMS messages. It was recently reported that over 2 Trillion of the these of these messages are sent through mobile devices around the globe daily, often forming part of the basic communication between two parties either close together or sometimes around the world. The advantages of SMS are speed, lower cost and easy-of-use. …

Full text of the article via The Power of GIS and SMS Alert Services.

%d bloggers like this: