this post was submitted on 08 Mar 2025
183 points (98.9% liked)

Cybersecurity

6552 readers
59 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] sunzu2@thebrainbin.org -3 points 1 day ago (2 children)

why do you think both android and ios always trying to keep BT turned on?

[–] osaerisxero@kbin.melroy.org 4 points 1 day ago (1 children)

For android, location services doesn't work properly without Bluetooth on, so that could be related

[–] sunzu2@thebrainbin.org 2 points 1 day ago (1 children)

I know BT will help location services, I am not sure what you mean will not work properly?

It won't pin location quick enough?

[–] osaerisxero@kbin.melroy.org 2 points 1 day ago

Iirc, precise location queries don't return values without the BT radio enabled. Works the other way too, the app needs location permission to discover bt devices in proximity and location must be enabled at the system level.

[–] IceFoxX@lemm.ee -1 points 1 day ago

step 1 Tracking and profilling step 2 selling data step 3 profit

Android and ios use completely different methods. For example, they listen to frequencies that are inaudible to us and, for example, TV advertising plays an inaudible sound as a trigger for Android/IOs in addition to the audible sound. To impose targeted advertising in order to allocate devices even without a network, etc. They wouldn't actually need backdoors as they get more than enough information as it is. But I don't want to imply that I don't expect backdoors there, because this has been proven in any case and often enough.