Group 8 Tracing Tracking Submission
Group 8 Tracing Tracking Submission
Gaurav Deshmukh
Madalasa Venkataraman
Yashveer Arya
Link to the Video:
drive.google.com
PDA Group 8 Midterm Submission - Google Drive
Location Tracking
Location tracking uses the location provided by the user to deliver a service, information, or perform a
specific task. The user location can vary from very precise to approximate.
Core use cases include:
Live Traffic, navigation, and public transportation apps
Travel and check-in apps for travelers
Social and dating apps
Food delivery and restaurants
Location privacy has become much more critical after the use of smart phones and wearables that are
carried in person in an always – on mode.
“The concept of location privacy can be defined as the right of individuals to decide how, when, and for
which purposes their location information could be released to other parties.”
How tracking works (Hardware POV)
Global Positioning System (GPS)
GPS is the most widely used form of geolocation technology used on mobile devices. GPS geolocation is
based on communication satellites that orbit the earth, that continuously broadcast their status, exact
location, and precise time. A GPS device that receives these signals is able to determine its GPS location.
The accuracy of the GPS location is based on several factors including atmospheric conditions, signal
blockage, and receiver design and quality, and it is between 33 to 330 feet. There are multiple techniques
that fraudsters routinely use to spoof location, including GPS spoofing apps, VPNs, Proxies, and emulators.
Secondary Use
Secondary uses of location data, while offering various benefits and services, can indeed raise significant
privacy concerns for users. Here's how each of the previously mentioned examples can lead to privacy
issues:
1. Targeted Advertising: While targeted ads can be relevant and useful, users may feel that their privacy
is invaded when they continuously receive location-based advertisements. This can create a sense of
being constantly monitored and may lead to concerns about the misuse of personal data for
commercial gain.
2. Geofencing and Proximity Marketing: Geofencing can lead to privacy concerns when users receive
notifications or marketing materials based on their location, as this can be seen as intrusive and may
reveal information about their whereabouts.
3. Fraud Detection: Users may be concerned about the extent to which companies use location data for
fraud detection and whether their location information is being stored or shared with third parties
without their knowledge.
Decisional interference
Decisional interference in the context of privacy refers to situations where external factors, such as
surveillance or manipulation, influence an individual's choices and decision-making processes. This
interference can indeed cause significant privacy concerns for users in several ways:
1. Self-Censorship: Users may engage in self-censorship when they are aware that their decisions and
actions are being monitored or influenced. They might refrain from expressing their true opinions,
engaging in certain activities, or visiting specific places out of fear that their choices could have
negative consequences or be misinterpreted.
2. Chilling Effects: Decisional interference can have a chilling effect on users' willingness to explore new
ideas, engage in dissenting opinions, or participate in activities that may be deemed unconventional.
This can stifle creativity, innovation, and diverse perspectives within society.
3. Conformity and Groupthink: The fear of decisional interference can lead individuals to conform to
prevailing norms and opinions, even when they may personally disagree. This can contribute to
groupthink and limit the diversity of thought and expression. This can limit the freedom to live according
to owns values and preferences.
4. Informed Consent: In cases where users are not fully informed about how their decisions are being
influenced or manipulated, their ability to provide informed consent is compromised. This raises ethical
concerns, particularly in situations where users may unknowingly make choices that are not in their best
interests.
5. Privacy as a Fundamental Right: Privacy is recognized as a fundamental human right, and decisional
interference can infringe upon this right. Users have a legitimate expectation that their decisions and
choices will be respected and not manipulated for external purposes.
To address these privacy concerns related to decisional interference, it is essential for organizations,
governments, and platforms to:
Be transparent about data collection and manipulation practices.
Obtain informed consent when necessary.
Ensure that users have control over the information and recommendations they receive.
Safeguard individuals' autonomy and freedom of choice.
Comply with privacy laws and regulations that protect users' rights.
The GDPR includes the concept of ‘pseudonymization', which help data controllers (similar to data
fiduciaries under the DPDP Bill) meet their data protection requirements. It is defined under Article 4(5) as
“the processing of personal data in such a way that the data can no longer be attributed to a specific
data subject without the use of additional information, as long as such additional information is kept
separately and subject to technical and organizational measures to ensure non-attribution to an
identified or identifiable individual.” Simply put, ‘pseudonymization' is the process of separating data
identifiers from the data, without holding any additional information, where identification is not possible.
Vulnerable populations and location privacy
• Vulnerable individuals as people who are more susceptible to privacy violations that result in
emotional, financial, or physical harm or neglect as a consequence of their race, class, gender or
sexual identity, religion, or other intersectional characteristics or circumstances that marginalize
them from society. (McDonald and Forte 2022)1
• Sometimes seemingly benign apps can have nefarious uses
• KidGuard, an app to keep tabs on children, used to surveil spouses, by stalkers tracking their
victims, etc.
• Spyware mSpy used in Intimate partner violence2
• The tracking app company mSpy told The New York Times that it sold subscriptions to more than
27,000 users in the United States in the first quarter of this 20183
1 McDonald, N., & Forte, A. (2022). Privacy and vulnerable populations. In Modern socio-technical perspectives on privacy (pp. 337-363). Cham:
Springer International Publishing.
2 Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., ... & Ristenpart, T. (2018, May). The spyware used in intimate partner violence.
In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 441-458). IEEE.
3 https://www.nytimes.com/2018/05/19/technology/phone-apps-stalking.html
Location privacy – user controls
• In Laptops, networks –
• location spoofing software,
• use of VPN’s to both confuse location specific content (to watch Netflix US from India, for example),
as well as to genuinely protect vulnerable populations4
• In phone and other IOT or wearables –
• Location spoofing
• Fine-grained and coarse grained location control to balance fraud detection while protecting
individual location
• Difference in location enabled services (where location is checked once, but not stored) and
location tracking services
• Options to ‘Allow once’, ‘Allow always’, ‘Allow in background’
• Explicit location permissions managed through browser and phone operating system ; since
location depends on OS managed software, checking apps that track location is easier.
4 BoZhao & Daniel Z. Sui (2017) True lies in geospatial big data: detecting location spoofing in social media, Annals of GIS, 23:1, 1-
14, DOI: 10.1080/19475683.2017.1280536)
Celebrated cases