this post was submitted on 10 Jun 2025
46 points (97.9% liked)
Technology
39165 readers
177 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm torn on this for any app-operating companies/orgs based in the US.
The real-time maps mean at best they're able to see at least the IPs of users, and at worst, a ton of device or personal information (depending on what perms are granted to the apps). This would be a treasure-trove of info for ICE. A lot of women stopped using period-tracker apps for a reason after Roe was overturned.
Also, unless people are side-loading the apps, Google or Apple will also know exactly who downloaded them, since you can't download through their app stores anonymously.
There are websites with real-time information that don't force you to install an app to view, and visiting a website rather than using an app makes it much easier to minimize the information you're leaking.
I'm glad that some of these apps are shutting down preemptively if they are certain they don't possess the resources, or are located in a safe enough place, to ensure their users' privacy. Ideally they would partner with a legal entity outside the US to operate the app instead, but obviously that's a big burden.
depending on how they implement it. ie. the covid map and wild fire map apps from the BC gov doesn't actually pull any information from your phone except location if you turn on the proximity alert. IF enough people download the app it would be very hard to locate the user even if you have location alert. It is a good idea to download EVEN if you are not in the targeted group cause projectiles won't stop mid air because you don't look like Latino. Simply be near the area of active raid carries risk.
It can be done proper and be great help for people either want to avoid be in the area or trying to help out fellow human beings.
If they're operating in the US, it doesn't matter whether the app is intentionally pulling unnecessary information, there are still server logs showing the IP of each request being made for the real-time updates (ISPs also will have logs of the connections, even if they can't see the SSL traffic directly). That IP + timestamp would let the government know (with the help of your ISP, who we know from the NSA leaks are all sharing info without asking for warrants) exactly who you are.
If you are routing all your traffic through a VPN, you can make that much harder to correlate, but unless you validate on the wire or in the code that the app isn't sending e.g. a device ID or any other kind of unique identifier, it could still end up compromising you. A webpage just intrinsically doesn't carry the same level of risk as a local app.
That's why, as the article notes, many of these have been shutting down preemptively; they know they could be putting their users at risk.