Google launches social distancing tracking site using location data - Bottom text

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Google launches social distancing tracking site using location data

RT: Sundar Pichai, CEO, Google 180124

Sundar Pichai, CEO, Google
Denis Balibouse | Reuters
Google
has launched a new website that uses anonymous location data collected from users of Google products and services to show the level of social distancing taking place in various locations.
The COVID-19 Community Mobility Reports
web site
will show population data trends of six categories: Retail and recreation, grocery and pharmacy, parks, transit stations, workplaces, and residential. The data will track changes over the course of several weeks, and as recent as 48-to-72 hours prior, and will initially cover 131 countries as well as individual counties within certain states.
Google says the data will be collected in aggregate, rather than at an individual level, and it won't show absolute numbers of people showing up at parks or grocery stores. The idea instead is to outline percentages, which highlight potential surges in attendance. For example, its first reports states that San Francisco County has seen a 72% drop in retail and recreation, a 55% decline in parks' population, and a 21% increase in residential population between Feb. 16 and March 29.

 
They're not even bothering to do so to effect something useful like tracking contacts of confirmed COVID patients? Just display a bunch of numbers that are hardly useful for anything beyond letting the Coronavirus Task Force and the CDC know when to whip harder?

It's a little early yet to roll out the fact they keep track of all your contacts and where you go and who you meet with irl if you use any of their global hegemony apps.
 
The joke's on Google. I spend all day hiding my cellphone in other people's pockets.
 
I mean really I would think a good VPN would help you out, but not with everything. When it boils down to it, I don't blame Richard Stallman for not wanting to own even a "dumb phone." He's been trying to warn us. I'm sure people are trying to find ways to jam signals and cloak themselves, to the degree of how much it will be effective is up to one's interpretation, and the competency of the companies, the governments, and the hackers involved.

EDIT: Also, at your own risk you could install custom firmware like LineageOS, formerly known as CyanogenMod on your phone. But make sure to back up your firmware and everything so that if you don't like it, you can go back to the stock firmware. I put CyanogenMod on my last phone, and gave it to my dad when I got my new one, and he had a lot of trouble getting shit to work with it. He had struggled for a long time to find the stock firmware to put back on it.
 
I mean really I would think a good VPN would help you out, but not with everything. When it boils down to it, I don't blame Richard Stallman for not wanting to own even a "dumb phone." He's been trying to warn us. I'm sure people are trying to find ways to jam signals and cloak themselves, to the degree of how much it will be effective is up to one's interpretation, and the competency of the companies, the governments, and the hackers involved.
You know, the funny thing about this is that dumb phones are probably more vulnerable to the most hypothetically dangerous location tracking situations that we think about.

This dumb summary data is based off Google location tracking. You can and should turn this off for your own safety- not only is it used for advertising, but if a police department asks for information about who was in the vicinity of a crime at a certain time then you could be fingered by Google if you happen to be nearby.

Now, you do need to worry about some other more basic forms of tracking. The most obvious is the fact that if the thing's turned on, it's talking to cell towers, and that locates you at every moment you walk around like that to within a few hundred yards for forever. That happens whether it's an Nokia 3310 in the hands of Sirajuddin Haqqani or a flash iPhone. As long as it's turned on, you're also vulnerable to exploits of the baseband (the radio modem) chip and the SIM card in the phone (where applicable) *, and if local LE is targeting you, they don't even need to do that, they can get your carrier to activate GPS tracking to an even higher degree than the triangulation. There's no real way to avoid this sadly.

Where it gets more interesting is if your phone is turned off. We've all seen TV shows where cell phones that are turned off are turned on remotely, but how actually plausible is this? For this to work, the baseband chip would have to actually be running and communicating with base stations when the main phone is powered off, because if it isn't running and talking then it can't get those instructions. I wouldn't be surprised if that's happening with older phones, before whacky ideas like 'airplane mode' and where the whole phone can stay powered on for a month and the baseband chip is presumably only consuming half of that at worst. But I've read expert commentary that suggests this probably isn't happening with recent smartphones, but noone really seems to know.

That said, if you are targeted by a nation state actor or a large spy consultancy, they may well be able to remotely install malware to the baseband chip that stops it from actually turning off and either provides location tracking by staying connected to the cellular networks, or through other more direct means. But.. generally this isn't going to happen to everyone in a population, because that would become obvious, only to targeted individuals. Hence why you should try to keep yourself off those lists.

NOTE: There is a level of tracking 'above' the Google level where many ad SDKs that pay app developers to be inserted into their apps (especially things like weather apps (as they have location permissions), children's games, etc) which can also collect various forms of identifying location and personally identifying information on you if you aren't careful, but I'm not aware of cases where these have been proven to be accessed by police. That might change if data aggregators like the one international criminal Peter Thiel owns start collecting data from these en masse. It might already be happening and we just don't know.

* Some of these attacks require that a local 'stinger' fake base station is used to trick your phone, as used by the American police against organized crime and Mossad against Americans in Washington D.C., though others may not. In some cases, a 'stinger' station may be able to remotely update baseband chip and potentially other firmware.
 
Back
Top Bottom