how Whisper app tracks ‘anonymous’ users

But on Monday – four days after learning the Guardian intended to publish this story – Whisper rewrote its terms of service; they now explicitly permit the company to establish the broad location of people who have disabled the app’s geolocation feature.

Whisper has developed an in-house mapping tool that allows its staff to filter and search GPS data, pinpointing messages to within 500 meters of where they were sent.

via Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian.

Whisper, which was recently valued at over $200m, has grown rapidly since its launch two years ago. It is among the fleet of confessional apps, such as Secret and Yik Yak, which backers say enable users to be more candid than they are on other social media platforms.

Vigilant Solutions National Vehicle Location Service

The largest pool of data is that harvested by Vigilant from commercial sources, most notably, Vigilant’s subsidiary, DRN (Digital Recognition Network). This pool of LPR data totals over 1.8 billion detections and grows at a rate of almost 70 million per month. This data is available via an annual subscription and greatly enhances an agency’s investigative reach.

via Vigilant Solutions National Vehicle Location Service.

Foursquare’s API Is A Pillar Of The Mobile App Ecosystem

Pick up your smartphone. Search through some of your favorite apps. Do you have Uber? Maybe Foodspotting? Surely you have Instagram. These apps, as well as a significant amount of the most popular apps in Apple’s App Store and Google Play, use Foursquare location data. For developers who have user actions or content tied to Foursquare venue IDs it would be difficult (if not impossible in some cases) to migrate their services off the Foursquare location database.

via Foursquare’s API Is A Pillar Of The Mobile App Ecosystem | TechCrunch.

Attackers have all they need from leaky cellphone networks to track you down

The researchers demonstrated how easy it was to track down a cellular device within a 10-block area in Minneapolis using a T-Mobile G1 smartphone and open source technology. They never contacted the service provider to conduct the test.

via Attackers have all they need from leaky cellphone networks to track you down.

PDF can be had here.