In message
<[log in to unmask]>, at
17:21:31 on Thu, 21 Jul 2011, Lawrence Serewicz
<[log in to unmask]> writes
>The following link makes for interesting reading if you link the locational data to street view.
>http://flowingdata.com/2011/07/21/data-reenactment-via-stolen-iphone/
I'm very interested - for a project I'm doing - in other anecdotes where
the iPhone (and is there an Android equivalent?) can leak this kind of
data to third parties.
What opportunities are there for the third parties to get hold of the
data without 'borrowing' the phone for a short time, and so on.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|