frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Firefox 144 for Developers

https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/Releases/144
1•bpierre•21s ago•0 comments

One-minute survey: What is the future of user research?

https://chat.withcoherence.com/Y8YPO4FzjuvjU1Bz5T8fP
1•zoomzoom•3m ago•1 comments

Are we all getting caught up in the AI craze?

https://www.amazonclimatejustice.org/open-letter
2•skyboots•14m ago•1 comments

GCC Operation Compile 200-ish LOC at -Os: Mission Failed (badly)

https://godbolt.org/z/3rhdM7fac
1•rpnx•18m ago•2 comments

Meditating with mongooses: Backyard wildlife phtotography lessons

https://wildgundmi.com/meditating-with-mongooses
3•mylittlefinger•22m ago•0 comments

Why There Hasn't Been a ChatGPT Moment yet in Manufacturing

https://theshearforce.substack.com/p/why-there-hasnt-been-a-chatgpt-moment
1•ironyman•24m ago•0 comments

Video Overviews on NotebookLM get a major upgrade with Nano Banana

https://blog.google/technology/google-labs/video-overviews-nano-banana/
2•fhk•24m ago•0 comments

Dynamically relevant consciousness precludes artificial consciousness (2023)

https://arxiv.org/abs/2304.05077
2•measurablefunc•25m ago•0 comments

Horizons of Clarity

https://alearningaday.blog/2025/10/14/horizons-of-clarity/
1•herbertl•28m ago•0 comments

API design principle: Don't tempt people to divide by zero

https://devblogs.microsoft.com/oldnewthing/20251013-00/?p=111677
1•signa11•29m ago•0 comments

.NET 10 Release Candidate 2

https://devblogs.microsoft.com/dotnet/dotnet-10-rc-2/
3•vyrotek•31m ago•0 comments

Show HN: An open-source, local-first Context7 alternative

https://github.com/cheolwanpark/snippets
1•covil•32m ago•0 comments

Your Data, Your Rules: AI's Demand for Customer-Controlled Architectures

https://site.tensor9.com/blog/ai-demand-customer-controlled-architectures
1•msarrel•38m ago•1 comments

Negative Mass [video]

https://www.youtube.com/watch?v=THT8Ncq85K0
1•surprisetalk•39m ago•0 comments

Planet Y: New Earth sized hypothetical planet in the Kuiper Belt

https://www.livescience.com/space/planets/planet-y-theory-hints-at-hidden-earth-size-world-lurkin...
2•pfdietz•42m ago•1 comments

Meta erases Gaza journalist's Instagram

https://twitter.com/DropSiteNews/status/1977795050206576763
2•yardie•42m ago•0 comments

Lexxy – The next generation rich text editor for Rails

https://blog.saeloun.com/2025/10/14/lexxy-editor/
2•thunderbong•44m ago•0 comments

NATO boss mocks Russian Navy, which is on the hunt for "the nearest mechanic"

https://arstechnica.com/security/2025/10/nato-boss-mocks-russian-navy-which-is-on-the-hunt-for-re...
3•duxup•46m ago•2 comments

Lessons from Running Apache Iceberg in Production at Uber and DoorDash

https://sites.google.com/view/icebergmeetup
4•talatuyarer•46m ago•0 comments

State Department Revokes Visas over Charlie Kirk Comments

https://www.wsj.com/politics/state-department-revokes-visas-over-charlie-kirk-comments-3c30d9ae
38•standardUser•48m ago•2 comments

U.S. Pressured Netherlands to Oust CEO of Chinese-Owned Chip Maker

https://www.wsj.com/tech/how-u-s-pressured-netherlands-to-oust-ceo-of-chinese-owned-chip-maker-da...
2•JumpCrisscross•49m ago•0 comments

Ally Petitt: Youngest OSCP at 16yo. Over 11 CVEs by 18

https://ally-petitt.com/en/posts/2024-05-07_how-i-became-a-hacker-before-i-finished-high-school/
1•nullbyte808•49m ago•0 comments

1929

https://nopolitik.substack.com/p/1929
1•GitPopTarts•54m ago•0 comments

Oura reaches $11B valuation with new $900M fundraise

https://www.cnbc.com/2025/10/14/oura-ringmaker-valuation-fundraise.html
1•voxadam•54m ago•0 comments

HalfStyle: Style each half or third of a character, vertically or horizontally

https://github.com/arbelh/HalfStyle
1•josephcsible•55m ago•0 comments

Binmoji: A 64-bit emoji encoding

https://github.com/jb55/binmoji
2•jb55•56m ago•0 comments

Concrete 'battery' now packs 10 times the power

https://techxplore.com/news/2025-10-concrete-battery-power.html
2•PaulHoule•1h ago•0 comments

FSF announces Librephone project

https://www.fsf.org/news/librephone-project
61•g-b-r•1h ago•10 comments

Ask HN: Designing complex or customisable platforms with good UI?

1•CuriousRose•1h ago•1 comments

Subtitle Quality Monitoring

https://subtitles.org.uk/
2•edward•1h ago•0 comments
Open in hackernews

Surveillance data challenges what we thought we knew about location tracking

https://www.lighthousereports.com/investigation/surveillance-secrets/
271•_tk_•4h ago

Comments

aucisson_masque•3h ago
I didn't quite understand how they are capable of tracking people and breaking WhatsApp encryption.

There is mention of fake antenna but I don't think they cover entire country with that, how do they do?

jonplackett•3h ago
Yes - and they also claim not to track users themselves. Is that just a lie or is there someone else doing the tracking?

This article answers none of my questions!

kipchak•3h ago
There's more details in the technical explainer linked in the article.

https://www.lighthousereports.com/methodology/surveillance-s...

CGMthrowaway•3h ago
They use vulns in the outdated SS7 system to trick networks into revealing a numbers location (1), and intercept SMS including the verification codes sent by apps like WhatsApp - allowing them to hijack accounts and monitor messages and calls directly (2). This method works remotely and doesn’t require antennas

The SMS are intercepted because thru SS7 by tricking the network into thinking the target phone is roaming (3).

(1)https://www.lighthousereports.com/methodology/surveillance-s...

(2)https://www.motherjones.com/politics/2025/10/firstwap-altami...

(3)https://www.fyno.io/blog/is-it-easy-to-intercept-sms-a-compl...

arkadiyt•3h ago
> intercept SMS including the verification codes sent by apps like WhatsApp

For anyone worried, this approach:

1) Breaks the existing phone from receiving WhatsApp messages, so you can notice that behavior

2) Can be prevented by setting up a WhatsApp pin in your settings

citizenpaul•3h ago
Not just vulns. It is possible to simply purchase access or become a provider in the SS7 system (<$20-50k USD). SMS is basically a completely open system at this point. Cybersecurity companies do it all the time for pentesting. So do "Cybersecurity companies".

Horrifying that nearly banks still require you to use sms as a 2fa and do not offer any other alternative.

Did you really think the US Gov was OK with facebook running the biggest "encrypted" SMS system on earth. LOL of course they already had access to all the messages.

varenc•2h ago
Hijacking WhatsApp SMS authentication codes can be prevented by just adding a PIN to your account. Doing this attack also doesn't grant you access to someone's old WhatsApp messages, and contacts with "security notices" enabled will see that your device has changed. It's quite different than big gov just having access to all your WhatsApp messages. (But there might be other ways they can do this, but just SMS sniffing doesn't get you there)
bayindirh•2h ago
> Horrifying that nearly banks still require you to use sms as a 2fa and do not offer any other alternative.

In my country banking applications are tied to your phone via IMEI, SIM and other hardware dependent information available.

Forget getting banking details and use another device without the user knowing, either.

If someone clones your SIM or gets a replacement in behalf of you, your all banking access is blocked until you enable them one by one with your ID card or other means.

One of the banks can use FaceID as a secondary factor, too.

So, other methods are possible. It's an "implementation detail" at this point.

simultsop•3h ago
And then they call people paranoid to go off the grid.
dylan604•3h ago
That's what they do to the people that figure things out. They discredit them so other people will not listen to them. It's the ones that go full tilt with lining the walls of their houses to be Faraday cages that make it all fringy cringy the rationally paranoid folks get lumped in with.
physarum_salad•3h ago
Well its always funny to observe politicians/other VIPs use similar technologies to the most "loopy" prepper when they need to. Like actual faraday/signal jamming tents during negotiations or similar.
lawlessone•2h ago
tbf, when the UK introduced a text to notify people of missing children ,some people(including relatives) were complaining on facebook that it could be used by the UK government to track everyone.

As if their government couldn't just track the smartphone or them via social media already.

dylan604•1h ago
The cognitive dissonance of thinking that apps are needed to track someone with a phone vs just being able to track your phone directly is very telling. Even before smart phones with apps, the tracking was there as a required feature to make mobile work. Granted, the number of people that spend any cycles thinking about how mobile signals work probably rounds to 0. It takes someone really dialed in to the details to come up interesting bolt on things to an existing system like tracking people with a mobile device just by looking at the logs. Same thing with looking at "just the metadata". While it may be obvious to those dialed in, to those oblivious it sounds crazy.
baxtr•3h ago
For anyone interested, they also have a technical explainer that describes their methodology in detail.

https://www.lighthousereports.com/methodology/surveillance-s...

janwillemb•3h ago
It is about a company, First Wap, that makes it possible to track individuals. Their USP is a piece of software that operates at phone network level and uses the fact that phone companies still support an old protocol, Signalling System 7:

> Phone networks need to know where users are in order to route text messages and phone calls. Operators exchange signalling messages to request, and respond with, user location information. The existence of these signalling messages is not in itself a vulnerability. The issue is rather that networks process commands, such as location requests, from other networks, without being able to verify who is actually sending them and for what purpose.

> These signalling messages are never seen on a user’s phone. They are sent and received by “Global Titles” (GTs), phone numbers that represent nodes in a network but are not assigned to subscribers.

beached_whale•2h ago
I assumed it was the telecoms just selling the data about their subscribers. https://www.telecomstechnews.com/news/fcc-fines-major-telcos...
pkulak•57m ago
Why not both?
beached_whale•55m ago
One would hope the selling is illegal and did more than just fine the companies.
overfeed•1h ago
> The issue is rather that networks process commands, such as location requests, from other networks, without being able to verify who is actually sending them and for what purpose

'Fun' fact: "other networks" includes all foreign networks with a roaming partnership. It's possible to abuse SS7 to track people across borders, from half the world away.

Tenemo•3h ago
> We found Netflix producer Adam Ciralsky, Blackwater founder Erik Prince, Nobel Peace Prize nominee Benny Wenda, Austropop star Wolfgang Ambros, Tel Aviv district prosecutor Liat Ben Ari and Ali Nur Yasin, a senior editor at our Indonesian partner Tempo.

Political figures being there I somewhat understand, but a Netflix producer? Why would anyone need to track a Netflix producer?

kipchak•3h ago
Maybe hoping to bump into them for a impromptu elevator pitch for a show?
gnatman•3h ago
Looking at his career and production credits, it’s probably more accurate to describe him as a journalist who’s covered some sensitive subjects.
layer8•3h ago
He’s also a journalist and had a carrier at the CIA. Why don’t you look him up if you’re curious about that?
kjs3•3h ago
They're a critic?
attila-lendvai•2h ago
look up Operation Mockingbird. half of the media is government operatives...

netflix is a crucial tool of narrative control...

they are nowhere near "just producers"...

trinsic2•2h ago
This is why I think Microsoft, Apple and Google are owned as well. And answers a lot of questions about gatekeeping and vendor lock-in
nostrademons•3h ago
It's fascinating how these secrets are turning up in the press now. The article is (probably intentionally) vague about it's sources: they only say "Lighthouse found a vast archive of data on the deep web". But reading between the lines - does that imply that this surveillance company kept records on thousands of targets, and then left them in an open S3 bucket? Not the first time - the TM_Signal leak of upper-echelon U.S. government communications was also facilitated by an open S3 bucket that contained the message archives of everything that, say, the Secretary of Defense was messaging to the POTUS.

But it is highly ironic that these companies specialize in surveillance, tracking, and security, and then have a tendency to leave the data that they steal from others open to the Internet in a very amateurish security lapse that in turn leads to everyone stealing from them.

dylan604•2h ago
Is it possible the phreakers are so specialized they have no experience with cloud admin and just went with some copypasta from SO answers to get the boring shit done so they could get back to phreaking? Not everyone is an expert in cloud management. It is easy to bork something when you have no idea what you're doing because you don't want to be doing it. They could have also hired low level people to do something for them and just didn't spend enough to have it done correctly. There's many reasons for a very specialized group of smart people to do something utterly dumb and easy to avoid by people with other specialized skills. These people would probably look at you as silly and amateur for using SMS.
walterbell•2h ago
"Why the US still won’t require SS7 fixes that could secure your phone" (2019) https://arstechnica.com/features/2019/04/fully-compromised-c...

  the group:

    - dragged its feet on resolving SS7 security vulnerabilities 
    - repeatedly ignored input from DHS technical experts
    - [identified] best practices.. using different filtering systems
    - [but] pushed.. to rely on voluntary compliance
daxfohl•2h ago
Did I miss something? This was not surprising. I figured all this would have been possible (and commonplace) decades ago. I was expecting this to be about government eyes and ears in my toilet or something.
Lapsa•2h ago
mind reading technology is here, an actual reality
lschueller•2h ago
Another brilliant example, why we need good (cooperating, international) journalism
malwrar•2h ago
I wish journalists would explore why the technical methods & information sharing that enable this surveillance are allowed to exist. Highlighting instances of abuse and the quasi-legal nature of the industry doesn’t really get at the interesting part, which is _what motivates our leaders to allow surveillance in the first place_.

I recently completed Barack Obama’s A Promised Land (a partial account of his presidency), and he mentions in his book that although he wanted to reform mass surveillance, it looked a little different once he was actually responsible for people’s safety. I often think about this when I drive past Flock cameras or walk into grocery stores; our leaders seem more enticed by the power of this technology than they are afraid of vague abuses happening in _not here_. It seems like no one sees a cost to just not addressing the issue.

By analogy, I feel that reporting on the dangers of fire isn’t really as effective as reporting on why we don’t have arson laws and fire alarms and social norms that make our society more robust to abuse of a useful capability. People who like cooked food aren’t going to engage with anti-fire positions if they just talk about people occasionally burning each other alive. We need to know more about what can be done to protect the average person from downsides of fire, as well as who is responsible for regulating fire and what their agenda for addressing it is. I’d love to see an article identifying who is responsible for installing these Flock cameras in my area, why they did so, and how we can achieve the positive outcomes desired from them (e.g. find car thieves) without the negatives (profiling, stalking, tracking non-criminals, etc).

01HNNWZ0MV43FF•1h ago
It might be like prison reform and prisoners' rights - Nobody gets elected on a "soft on crime" platform, and civic engagement at the state and local level is so bad that people typically put up with cameras instead of agitating to get them banned. I say agitate. Show up, keep showing up, keep talking, keep telling friends. We can fight this. Democracy will work if we get people onboard, one way or another
3eb7988a1663•51m ago
You are more optimistic than I am. Flock and friends seem something like ChatControl. Those in power who want it have unlimited patience. They will keep pushing for expanded capabilities for the day when public attention has failed. Once they win, near impossible to revoke.
Gigachad•53m ago
I’m not totally opposed to surveillance, I just wish it was more transparent and limited to need to know uses.

If the police need your google search history thats ok as long as they can get a warrant showing they have justification and then perhaps at a delayed time, the account owner should be notified that this happened.

If they need access to your phone, rather than hacking it they should just take it off you and get the password from you.

This limits tracking since this is a fairly disruptive and visible thing and prevents just passive tracking of everyone all the time.

Businesses who use facial recognition for loss prevention should be legally required to only use their data for this purpose and never for marketing and analytics. They must not ever sell the data and delete it within a reasonable time.

martin-t•3m ago
What kind of crimes does surveillance prevent or help solve?

1) It does not _prevent_ the most serious crimes. People who are going to murder or rape someone are often not mentally capable or understanding how likely they are to get caught or caring about it in the moment. It might help solve it but there's usually more than enough conventional evidence. And these crimes are typically not what people coordinate with others so surveilling communication does not help much.

2) Stealing? Maybe. I can imagine cameras dissuade some opportunists but then again, shoplifting is reportedly high with self-checkouts and those are packed with cameras. Other kinds like burglars will probably just learn to be more careful with gloves and masks. And surveilling communication does not help unless we're talking organized crime and those people should be competent enough to use encrypted comms even if the major platforms are backdoored.

3) Crimes of opportunity like vandalism. Again, cameras are enough, if they work at all. The extra fraction of idiots who would be caught because they brag only about setting a trash can on fire it negligible compared to the downsides.

---

What surveillance absolutely could deter and help catch is organized resistance like staging a protest/riot/insurrection or individuals doing research before an assassination.

And that's why politicians, who are the most likely victims of these crimes, want surveillance. And you might genuinely believe that no current politician in your country deserves to be shot or that the current government should not be overthrown.

But we have to keep in mind that the next government will inherit these systems. Nothing is permanent, no democracy will last forever.

Historically, most countries have periods of freedom and authoritarianism, separated by collapse or revolt. At some point, in your country too, people will need to rise up to reassert their rights again.

It's a matter of when, not if.

---

I see where you are coming from and there were times in my life where more surveillance would have helped my side but ultimately, it's a balancing act and surveillance tips the scale in favor of people who already have a lot of power.

armchairhacker•52m ago
Everyone thinks when they have power, they’ll use it correctly, because they have (from their perspective) good intentions.

An ideal government with total surveillance is the best case. You get the benefits of low crime without the drawback of corruption and ideology. The problem is in practice:

- Large institutions aren’t good at exercising fine control: even if the leaders have truly good intentions, corrupt mid-level employees and inaccurate data lead to bad outcomes.

- Good leaders seem to often pick bad successors, and unless they frequently pick better successors, someone will eventually pick a corrupt one.

- Corrupt leaders seem to be good at ousting or sidelining good leaders, more than vice versa, perhaps because good leaders are less passionate about gaining and keeping power.

Perhaps there are other reasons. Not just ideal governments, but even self-preserving governments don’t tend to last. Hence, although decentralization and privacy are never ideal, they should exist at least for backup, “just in case” (inevitably in practice) the centralized surveillance system goes rouge.

bombdailer•30m ago
There's a reason Plato's Republic looks authoritarian to people, because it models a city in which justice is the highest good, and justice and freedom are ultimately opposed to each other.

Since governments and laws exist to ensure justice, freedom will always be the price we pay.

potato3732842•26m ago
>governments and laws exist to ensure justice

Governments mostly exist to coordinate resource usage to out compete other societies.

Some amount of justice and welfare and roads, or whatever other things (varied by society and time period), are what they pay us so that our compliance is mostly voluntary and is therefore substantially more efficient.

You can bicker over exact word choice and the minute, but this general form is how it's always been from the present all the way back into the ancient world.

airstrike•13m ago
Governments exist to monopolize violence in the hands of a few so that we may have less violence and more order overall.
martin-t•27m ago
> Good leaders seem to often pick bad successors

This whole way of thinking makes my skin crawl.

Just like sex, any kind of power exchange needs consent.

This whole idea that people are led or need to be led is wrong. Perhaps some people do but that's their problem, it shouldn't be mine. What politicians are is decision makers, not leaders.

We don't have time to vote on every single law personally, so we appoint temporary assistants who do it for us, based on our preferences. That's how it should work.

These assistants should work for us, not lead us. We should always have the power to override their decisions and to remove and replace them at any time. Of course, making this work in a practical manner, while satisfying constraints such as secrecy of votes, is difficult. I don't dispute that but we should be striving to find ways to get as close to this ideal as possible, not making politics into a career or treating it as a reality show.

And most certainly, these assistants ("leaders" as you call them) should not be picking their successors without our consent.

CobrastanJorji•16m ago
Voting isn't necessarily a better system. The majority of people will very frequently give up rights in any given specific case that, in general, they hold dear. We're not rational actors.

And there are a lot of really weird discussions to be had about "consent," too. If we allow unlimited speech, that means that we're all subject to marketing and propaganda, and that's another thing that people are quite vulnerable to. Being convinced to vote via propaganda isn't really a great example of consent. But banning any speech that resembles propaganda is rife with problems.

Anyway, my point is that democracy/voting and free speech isn't necessarily the most free/consented-to form of government. I'm not sure what would take its place, though. I certainly wish I knew.

AnthonyMouse•4m ago
> And most certainly, these assistants ("leaders" as you call them) should not be picking their successors without our consent.

Whether they pick them or you pick them, you still have the same problem.

Bad people often get into office. Politicians lie, major parties both run bad candidates, sometimes voters are of the inclination to just elect whoever they think will mount the strongest assault on the status quo.

Expecting that never to happen is a lot less pragmatic than setting things up ahead of time to mitigate the damage when it does.

hammock•3m ago
Personally I would still call that leading/being led, nonetheless that is a great reframe and I agree.

It also helps make the point of what it means to say “society breaks down” or “democracy is at stake” or “faith in our institutions is flagging.” What it really means is that those whom were thought of as leaders no longer have the consent of the followers, who are making their own decisions now- often to ill effect of any strangers around them

martin-t•35m ago
Because when you call them leaders and when they see themselves as leaders, they see themselves as a separate class. A permanent difference from the " mere citizen" class.

"Citizens will be on their best behavior because we are constantly recording and reporting everything that’s going on." -- Larry Ellison (who should not be anthropomorphized)

And Ellison is not even a politician, he doesn't even has any kind of immunity. Meanwhile, EU politicians want to impose Chat Control on everyone except them.

The core issue is that they see themselves as different from us.

Politics should not be a career. It should be something a person does for 5, at most 10 years max and after that they are back to being like everyone else, with 0 benefits (and with potentially more surveillance, I think politicians' finances should be under extra scrutiny for the rest of their lives).

themafia•32m ago
> it looked a little different once he was actually responsible for people’s safety.

That seems highly disingenuous or just ignorant. We publicly had this problem starting in the 1990s. The NSA used to have a program that would capture data but then encrypt it and protect it from random access. They discontinued that program and instituted a new one that had zero privacy protections in it.

This was right at the turn when the "war on terror" started. Which was the excuse then used to abandon the better program for the egregious one since it was projected to be better for this particular use case. It's debatable whether that was true or not.

> Flock cameras or walk into grocery stores

Record it if you want. Law enforcement, at any level, should require an actual warrant to access it in any form. This isn't a binary. You can enhance security and privacy at the same time.

potato3732842•30m ago
> It seems like no one sees a cost to just not addressing the issue.

It's the same "impose a small but poorly defined cost on everybody and act as though it's worth it because it maybe saves one defined life and therefore anyone who wants to call you out has an uphill battle" model you see used by bad people and dishonest comment section types the world over.

Society has no good way to reason about these "it's not much individually but when you do it to all of society it adds the F up" type downsides.

Like if you could save one life per year at the cost of making it take everyone an extra minute per day that's obviously not worth it at the scale of the united states because you're actually losing more life than you're saving.

But replace the "one minute" with something more subjective and nobody calls it out.

King-Aaron•18m ago
> I wish journalists would explore why the technical methods & information sharing that enable this surveillance are allowed to exist.

It boils down to one thing that allows these surveillance technologies to exist: public apathy.

kklisura•2h ago
> This investigation began with an archive of data. [...] It contains 1.5 million records, more than 14,000 unique phone numbers, and people surveilled in over 160 countries.

Why not HIBP (Have I Been Pwned) style site to check against the database if your number is in?

hughw•1h ago
Right! I expected one.
Flockster•1h ago
I could not compare it completely, but it sounds very much like this talk that I saw many years ago at the CCC.

SS7: Locate. Track. Manipulate. [2014] https://media.ccc.de/v/31c3_-_6249_-_en_-_saal_1_-_201412271...

effdee•5m ago
Tobias Engel's initial video about this was "Locating Mobile Phones using SS7" given at the 25C3 in 2008:

https://media.ccc.de/v/25c3-2997-en-locating_mobile_phones_u...

alganet•1h ago
I think the world is not ready for the level of surveillance that exists in the wild.

For example, this post could have been a product of just probing a particular group of people to understand if they are interested in the subject and what they have to say about it.

That can be done indirectly, by suggesting someone (offering a link or planting an idea) that is already known to be interested in surveillance and prone to share interesting discoveries (in other words, the poster might not even be aware he could be an asset).

Think about the many ways someone could know your interests and how prone you are to react to something and how that could be used. If you are in tech, think about all the silly ways that kind of information can leak publicly.

People often disregard the possibility that they could be an active part of a surveillance network (as an unkowingly asset), instead focusing on more fantastical ideas such as technological hacks or coding wizardry.

EMM_386•1h ago
More on ALTAMIDES and system modules:

https://www.giosec.uk/specialist-services---geo-location.htm...

dogman144•1h ago
Reads like they’re doing one of several way to get mobile device IDs, and then x-ref those against anon’d adtech datasets that anchor on the mobile ID.

If your device privacy is a mess, mobile ID links you to all the good and bad things you do on a phone.

Had no idea this was part of the tool options, but backbone cell network makes sense.

Other TTPs I’d read about was variations on geo-fenced adserving to phish a mobile ID basically via user interaction or scroll past the ad. Small enough geofence and do it a few times, one could safely figure out the user being the ID. Googling “RTB surveillance” or “DSP surveillance” are ways into the topic.

Scary stuff! Pair that with this tech has been working for years, and is international. Frames a bit differently every action by a public figure - also at risk via the same threat model.

Also long have wondered what data analysis like this is done on technical forums… ran by a VC firm… with a lot of insider context (product market fit?) in the comments.