Confirmed users
555
edits
(→Wifi) |
(→Wifi) |
||
| Line 17: | Line 17: | ||
While Wifi networks send radio signals into the public space, different countries have very different views on the privacy aspects of them. | While Wifi networks send radio signals into the public space, different countries have very different views on the privacy aspects of them. | ||
For the purposes of the geo-location service we are only interested in the public metadata about wifi networks, specifically the technology standard in-use, the frequency it's operated on, the signal strength | For the purposes of the geo-location service we are only interested in the public metadata about wifi networks, specifically the technology standard in-use, the frequency it's operated on, the signal strength and the technical network name (bssid). We'll never listen in or record actual network traffic. | ||
For the wifi operator to opt-out, we follow the industry standard of filtering out any wifi networks with a clear text name (ssid) ending in '_nomap' and ignore any ad-hoc wifi networks. Both of these filter actions happen on the client side, so our service never sees them. | For the wifi operator to opt-out, we follow the industry standard of filtering out any wifi networks with a clear text name (ssid) ending in '_nomap' and ignore any ad-hoc wifi networks. Both of these filter actions happen on the client side, so our service never sees them. | ||
On the lookup side, we follow the best practice and require two co-located pieces of information to provide a location answer. This further minimizes the risk of someone being able to lookup the whereabouts of a single bssid over time. | |||
===IP addresses=== | ===IP addresses=== | ||
In the future we might want to use Geo-IP based lookups to enhance or provide coarse-grained fallback for the service. Before we do this, we'll do a thorough analysis of the involved risk, as the combination of IP address and time of service usage can uniquely identify users. | In the future we might want to use Geo-IP based lookups to enhance or provide coarse-grained fallback for the service. Before we do this, we'll do a thorough analysis of the involved risk, as the combination of IP address and time of service usage can uniquely identify users. | ||