Comment on New apps help immigrants navigate Trump’s deportation crackdown
t3rmit3@beehaw.org 5 days ago
I’m torn on this for any app-operating companies/orgs based in the US.
The real-time maps mean at best they’re able to see at least the IPs of users, and at worst, a ton of device or personal information (depending on what perms are granted to the apps). This would be a treasure-trove of info for ICE. A lot of women stopped using period-tracker apps for a reason after Roe was overturned.
Also, unless people are side-loading the apps, Google or Apple will also know exactly who downloaded them, since you can’t download through their app stores anonymously.
There are websites with real-time information that don’t force you to install an app to view, and visiting a website rather than using an app makes it much easier to minimize the information you’re leaking.
PenguinTD@lemmy.ca 5 days ago
depending on how they implement it. ie. the covid map and wild fire map apps from the BC gov doesn’t actually pull any information from your phone except location if you turn on the proximity alert. IF enough people download the app it would be very hard to locate the user even if you have location alert. It is a good idea to download EVEN if you are not in the targeted group cause projectiles won’t stop mid air because you don’t look like Latino. Simply be near the area of active raid carries risk.
It can be done proper and be great help for people either want to avoid be in the area or trying to help out fellow human beings.
t3rmit3@beehaw.org 3 days ago
If they’re operating in the US, it doesn’t matter whether the app is intentionally pulling unnecessary information, there are still server logs showing the IP of each request being made for the real-time updates. That IP + timestamp would let the government know (with the help of your ISP, who are all in bed with the government) exactly who you are.
If you are routing all your traffic through a VPN, you can make that much harder to correlate, but unless you validate on the wire or in the code that the app isn’t sending e.g. a device ID or any other kind of unique identifier, it could still end up compromising you. A webpage just intrinsically doesn’t carry the same level of risk as a local app.
That’s why, as the article notes, many of these have been shutting down preemptively; they know they could be putting their users at risk.
PenguinTD@lemmy.ca 1 day ago
thanks for taking the time explain the details. I guess when working against gov level tracking you need Tor/VPN/etc to stay safe.