Is Your Mobile Provider Tracking Your Location? This New Technology Could Stop It. – USC Viterbi | School of Engineering – USC Viterbi School of Engineering

tracking1200 ProxyEgg Is Your Mobile Provider Tracking Your Location? This New Technology Could Stop It. - USC Viterbi | School of Engineering - USC Viterbi School of Engineering

To receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries. Now, researchers have found a way to stop this privacy breach. Art/iStock.

Right now, there is a good chance your phone is tracking your location—even with GPS services turned off. That’s because, to receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries based around selling users’ location data to third parties without consent.

For the first time, researchers at the University of Southern California (USC) Viterbi School of Engineering and Princeton University have found a way to stop this privacy breach using existing cellular networks. The new system, presented at USENIX Security conference on Aug. 11, protects users’ mobile privacy while providing normal mobile connectivity.

The new architecture, called “Pretty Good Phone Privacy” or PGPP, decouples phone connectivity from authentication and billing by anonymizing personal identifiers sent to cell towers. The software-based solution, described by the researchers as an “architecture change,” does not alter cellular network hardware.

“We’ve unwittingly accepted that our phones are tracking devices in disguise, but until now we’ve had no other option—using mobile devices meant accepting this tracking,” said study co-author Barath Raghavan, an assistant professor in computer science at USC. “We figured out how to decouple authentication from connectivity and ensure privacy while maintaining seamless connectivity, and it is all done in software.”

Decoupling authentication and phone connectivity

Currently, for your phone to work, the network has to know your location and identify you as paying customer. As such, both your identity and location data are tracked by the device at all times. Data brokers and major operators have taken advantage of this system to profit off revealing sensitive user data—to date, in the United States, there are no federal laws restricting the use of location data.

“Today, whenever your phone is receiving or sending data, radio signals go from your phone to the cell tower, then into the network,” said Raghavan. “The networks can scoop up all that data and sell it to companies or information-for-hire middlemen. Even if you stop apps tracking your location, the phone still talks to the tower, which means the carrier knows where you are. Until now, it seemed like a fundamental thing we could never get around.”

But Raghavan, with study co-author Paul Schmitt who recently joined USC’s Information Sciences Institute from Princeton University, found a way: they decoupled what’s known as authentication—who you are—from your phone connectivity. The key finding: there is no reason why your personal identifier has to grant you network connectivity.

Their new system works by breaking the direct line of communication between the user’s cellphone and the cell tower. Instead of sending a personally identifiable signal to the cell tower, it sends an anonymous “token.” It does this by using a mobile virtual network operator, such as Cricket or Boost, as a proxy or intermediary.

“The key is – if you want to be anonymous, how do they know you’re a paying customer?” said Raghavan. “In the protocol we developed, the user pays the bills, and gets a cryptographically signed token from the provider, which is anonymous. Now the identity in a specific location is separated from the fact that there is a phone at that location.”

Restoring control

The duo, who have launched a startup called Invisv, prototyped and tested everything with real phones in the lab. Crucially, their approach adds almost zero latency and doesn’t introduce new bottlenecks, avoiding performance and scalability problems of other anonymity networks. The service could handle tens of millions of users on a single server and would be deployed seamlessly to customers through the network operator.

Since the system works by stopping a phone from identifying its user to the cell tower, all other location-based services—such as searching for the nearest gas station, or contact tracing—still work as usual. The researchers hope the technology will be accepted by major networks as default, particularly with mounting legal pressure to adopt new privacy measures.

“For the first time in human history, almost every single human being on the planet can be tracked in real-time,” said Raghavan. “Until now, we had to just silently accept this loss of control over our own data—we believe this new measure will help to restore some of that control.”

Source of this news: https://viterbischool.usc.edu/news/2021/08/is-your-mobile-provider-tracking-your-location-this-new-technology-could-stop-it/

Related posts:

Surfshark adds new cutting-edge technology to its VPN service - TechRadar
Audio player loading… Surfshark has announced it is adding new Nexus software defined network (SDN) technology to its consumer-faced VPN product.SDN is prevalent in enterprises and businesses whe...
Headphones not working in Windows 11? Fix it with ease - WindowsReport.com
by Vlad Turiceanu Editor-in-Chief Passionate about technology, Windows, and everything that has a power button, he spent most of his time developing new skills and learning more about th...
Government Internet Shutdowns Are Changing. How Should Citizens and Democracies Respond? - Carnegie ...
SummaryGovernments worldwide continue to deploy internet shutdowns and network disruptions to quell mass protests, forestall election losses, reinforce military coups, or cut off conflict areas from ...
Why Your Company Should use Proxy Servers? - Foreign Policy 2018
If you are just an average Joe, then you probably don’t have a full understanding of the purpose and use of proxy servers. Most people heard about using a proxy for unblocking the US library on ...
Form F-3 China Finance Online - StreetInsider.com
Get instant alerts when news breaks on your stocks. Claim your 1-week free trial to StreetInsider Premium here.   Registration No. 333-_______     UNITED STATES SECURITIES AND EXCHA...
Precisely is NBA 2K22 error app|code calculatordecoder} 727e66ac? - Sportskeeda
NBA 2K22 ended up being out for less than two weeks. Has garnered largely positive reviews just like millions of gamers worldwide are exploring every facet of the. However , there are bound to b...
Vulnerability Could Expose HAProxy to HTTP Request Smuggling Attack | eSecurityPlanet - eSecurity Pl...
A critical vulnerability discovered in the open-source load balancer and proxy server HAProxy could enable bad actors to launch an HTTP Request Smuggling attack, which would let them bypass security ...
Capitol, symbol of democracy, off-limits on Independence Day on the list of New York Daily News
“What has become heartbreaking about it is that the Capitol has been forever our symbol of democracy — going through through the Civil War, implies of world wars, through strife of all kinds, ” s...
Choose a Proxy Server and / or maybe VPN in 2022? guidebook jim o brien
Both VPN and also proxies appear to have become buzzwords in the world of internet security. Few people know the difference or this also actual benefits either with this two options offers, thoug...
Educate Yourself To Improve Your Online Privacy - Youth Incorporated - youthincmag.com
Photo by Ed Webster from Pexels The internet is vast, and it connects millions of devices. Regardless of who you are and what you do, using a private proxy is beneficial. In recent years, private pro...
Email Ad Monetization Will Get Harder With iOS 15 - AdExchanger
"The Sell Sider" is a column written by the sell side of the digital media community. Today’s column is written by Chris Shuptrine, VP of marketing for Kevel. Email ad monetization will forever...
Android on Windows, WHQL-signed malware atacks, and 21H2 builds are presented in this week's Microso...
We’ve come into the end of the week, which leads to it’s time to take a look go back at what’s transpired here in Microsoft’s world over the last few within the. Microsoft’s primary focus with re...
Type. io Brings 'Camera so as to Cloud' Functionality to Just Going Anyone - PetaPixel
[embedded content] Adobe is utilizing its acquisition of Frame. io to expand cloud a joint venture access — including the capacity to send content directly from some sort of camera to editors ...
VPNs vs. Proxies: What's the Difference? - PCMag
While VPNs are sucking up all the oxygen in the privacy conversation, there is a similar technology that hasn't gotten the same attention: the humble proxy. We asked experts from two leading VPN comp...
How to Install Minikube on Debian 11 Bullseye Linux - Linux Shout
Do we really need an entire server or cloud to start with Kubernetes Cluster? The answer is ‘No‘ because it is possible to use Minikube to implement a Kubernetes cluster with just a single node o...
What Are The Different Types Of Proxy Server A Person Can Choose From? - Programming Insider
Do you know what a proxy server is? The router or the system provides a medium between the users and the internet. It helps in preventing the cyber net that can attack your system; it keeps the atta...
Tests WebSockets with Burp Apartment - The Daily Swig
QUALITY WebSockets are long-lived connections of support asynchronous communication in both directions. Burp Suite characteristics rich set of tools to support protection testing WebSockets...
Getting started with Burp Proxy's HTTP history - The Daily Swig
PROFESSIONAL Burp Proxy is a web proxy server that lets you view, intercept, and even modify the communication between Burp's browser and web servers. The HTTP history tab displays a log of the HTT...

IP Rotating Proxy Onsale

SPECIAL LIMITED TIME OFFER

00
Months
00
Days
00
Hours
00
Minutes
00
Seconds
First month free with coupon code FREE30