- cross-posted to:
- technology@lemmy.world
- hackernews
- cross-posted to:
- technology@lemmy.world
- hackernews
An amazing bit of digital detective work here. Seems like Linux mobile is your only off ramp from being exhaustively tracked
An amazing bit of digital detective work here. Seems like Linux mobile is your only off ramp from being exhaustively tracked
Is there any straightforward way of stopping this besides dropping off the grid?
I imagine an ad blocker could prevent this data going out, unless the hosts were generic and the game/app simply won’t work without allowing those connections. I’ve never seen an app be [obviously] broken from my ad blocker but I am interested in running a similar experiment to see just how much data is going out.
Route all or traffic through tor. Never log into anything. Never use the same identity twice. Ahh and live in a hut in the woods never going to shops or cities that have security cameras.
I think it’s more: “Don’t use a smartphone”. It’ll send those requests through any internet connection. No matter if it’s a VPN or Tor.
I forgot I’m in a minority of people running a properly secure degoogled ROM.
Same, same. But the occasional app refusing to work due to missing Play services, all the Instagram posts everyone except me took notice of, and all the hoops I have to jump through, kind of remind me of that regularly.
…where are chains allowed to abuse security camera footage for ad tracking?
Bunnings in Australia until very recently and u have basically 0 protections in the states.