med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

361
active users

#localhosttracking

0 posts0 participants0 posts today
boredsquirrel<p>A few counterarguments on <a href="https://tux.social/tags/LocalMess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalMess</span></a> (<a href="https://tux.social/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://tux.social/tags/Instagram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Instagram</span></a> <a href="https://tux.social/tags/Yandex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yandex</span></a> <a href="https://tux.social/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a>), why this would make <a href="https://tux.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> worse than <a href="https://tux.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a>:</p><p>This vuln seems to only have existed on Android, but not everyone would need to be affected by it.</p><p>I see <a href="https://tux.social/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> as a perfected form of the Android idea (stripping the <a href="https://tux.social/tags/Advertizing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Advertizing</span></a> and Tracking from it, and adding needed permissions).</p><p>1/8</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>guardianproject</span></a></span> </p><p>At this point I'd like to ask when <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>EUCommission</span></a></span> and other <a href="https://infosec.space/tags/regulators" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulators</span></a> start <a href="https://infosec.space/tags/banning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>banning</span></a> <a href="https://infosec.space/tags/StasiBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StasiBook</span></a> and other <a href="https://infosec.space/tags/GAFAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAM</span></a>|s for their blatant actions as <a href="https://infosec.space/tags/OrganizedCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OrganizedCrime</span></a> to violate <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> standards in the <a href="https://infosec.space/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> and elsewhere?</p><p><a href="https://infosec.space/@kkarhan/114733606176520273" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.space/@kkarhan/1147336</span><span class="invisible">06176520273</span></a></p><p>Cuz at this point the €32B fines <em>at maximum are</em> a joke. </p><ul><li>I think that people <em>espechally in Germany</em> who may be affected [I'm not!] consider seeking legal advice and potentially file charges for said <a href="https://www.gesetze-im-internet.de/stgb/__202c.html" rel="nofollow noopener" target="_blank">digital espionage</a> and <a href="https://www.gesetze-im-internet.de/stgb/__303b.html" rel="nofollow noopener" target="_blank">computer sabotage</a> against <a href="https://infosec.space/tags/NSAbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSAbook</span></a>! </li></ul><p>Simply because this isn't a <em>mere</em> violation of <a href="https://infosec.space/tags/GDPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GDPR</span></a>, <a href="https://infosec.space/tags/BDSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BDSG</span></a> and other standards, but literal <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> that has been deployed against users in the wild... </p><ul><li>Anything but actual prison sentences &amp; arrest warrants against the persons responsible would be undue leniency.</li></ul><p><a href="https://infosec.space/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a> <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/StasiBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StasiBook</span></a> <a href="https://infosec.space/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://infosec.space/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> I am pretty shure <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBrowser</span></a> and any <a href="https://infosec.space/tags/App" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>App</span></a> that does <a href="https://infosec.space/tags/Proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxy</span></a> through <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>guardianproject</span></a></span> / <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Orbot</span></a> for <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> access is not affected but I do encourage both <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> and Orbot devs to test against <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a>!</p><p><a href="https://infosec.space/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a> <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/StasiBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StasiBook</span></a> <a href="https://infosec.space/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://infosec.space/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a></p>
Kevin Karhan :verified:<p>The fact that <a href="https://infosec.space/tags/NSAbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSAbook</span></a> is literally developing <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> to track users and bypass <a href="https://infosec.space/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.space/tags/sandbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sandbox</span></a> as well as <a href="https://infosec.space/tags/tracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tracking</span></a> them regardless of <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a>, <a href="https://infosec.space/tags/Cookies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cookies</span></a> or <a href="https://infosec.space/tags/IncognitoMode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncognitoMode</span></a> use or blockage.</p><p><a href="https://www.youtube.com/watch?v=LUtctMShGJw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=LUtctMShGJw</span><span class="invisible"></span></a> via <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> </p><p>More to readup upon.<br><a href="https://redact.dev/blog/meta-yandex-localhost-tracking" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redact.dev/blog/meta-yandex-lo</span><span class="invisible">calhost-tracking</span></a><br><a href="https://www.zeropartydata.es/p/localhost-tracking-explained-it-could" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zeropartydata.es/p/localhost-t</span><span class="invisible">racking-explained-it-could</span></a></p><p><a href="https://infosec.space/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a> <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/StasiBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StasiBook</span></a> <a href="https://infosec.space/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://infosec.space/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a></p>
m_berberich<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heiseonline</span></a></span> </p><blockquote><p>Die Chats selbst sollen davon aber nicht betroffen sein, beteuert das Unternehmen.</p></blockquote><p>Nur zur Info:<br>Das ist das gleiche Unternehmen, daß mit localhost tracking die Sicherheitsmechanismen von Android umgangen hat um Benutzer besser tracken zu können·</p><p><a href="https://infosec.exchange/@isotopp/114663960595107813" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@isotopp/1146</span><span class="invisible">63960595107813</span></a></p><p><a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> <a href="https://infosec.exchange/tags/Whatsapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whatsapp</span></a> <a href="https://infosec.exchange/tags/localhosttracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>localhosttracking</span></a></p>
quaff<p>If you're on Android and you have any Meta apps installed, you need to remove those immediately and use the web versions (or just deactivate your accounts). iOS won't have this issue, but for good measure, do it anyway.</p><p>Meta has been running background localhost services via their Android apps. The Meta Pixel trackers on websites post back to these services.</p><p>Allowing them to track you when not using their apps. </p><p><a href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/</span></a></p><p><a href="https://thecanadian.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://thecanadian.social/tags/meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meta</span></a> <a href="https://thecanadian.social/tags/facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>facebook</span></a> <a href="https://thecanadian.social/tags/localhosttracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>localhosttracking</span></a></p>