[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Russia Is the Last Remaining Christian Country

Zelensky’s Long History of Crushing Dissent

Zelensky Seeks To Ban Russian Orthodox Church In Ukraine

VIDEO: Kevin McCarthy Confronted Heading Into State Dinner Attended By Hunter Biden

This is horrifying - yeT DemocraTs will say ... “AnyThing BuT Trump!” --- Our counTry has gone drown The (uke)drain.

Sen. Cruz Outlines the Grim Outcome If Herschel Loses Georgia

Dutch Police Overturn Farmers’ Tractors with Farmers in Them –

Growing Number of GOP Leaders, Elected Officials Say It's Time for a Change in RNC Leadership

CNN Starts Layoffs And WaPo Ends Sunday Magazine Amid "Economic Headwinds"

'Lobbying Firm for Far Left Politicians': Elon Musk Rips NY Times for Silence on Twitter Censorship Story

Texas Girl, 7, Found Dead 2 Days After Being Abducted by FedEx Driver Delivering a Package to Her Home

Underdog: Stacked Up Against 11 Coyotes, Herd Dog Kills 8 to Save Sheep in Decatur Neighborhood

Winter in Central Europe and for the Dollar

Children’s Minister Arrested for 215 Counts of Child Porn Linked to Agape Boarding School

“You can’t … you’re not capable … you can only succeed if ….”

SBC President Bart Barber Says Predecessor Johnny Hunt is Unfit to Return to Ministry

Premature baby who weighed the same as a loaf of bread heads home

State Figures Provide Important Context for National Abortion Trends

MinistryWatch’s 2022 Shining Light Awards

The Woke Chokehold

Texas Abortions Drop From 2,500 to 68 in First Month After Roe Overturned

Why do Democrats refuse to treat abortion survivors? A dead baby was always the point. How you got there was just details.

Bethel Members Now Have Majority on Redding City Council

New Zealand admits it has direct access to Facebook takedown portal where it can flag content for censorship

This is how the ELCA celebrated Thanksgiving

Targeting Families: Former Sex Educator Exposes Horror Aimed at Children

Exclusionary Inclusionism

The Evil of the Political Left Is Rooted in Their Exploitation of Tragedies

BidenÂ’s hypocrisy on unions: Everyone else pays but him

Americans Can't Pay Energy Bills – Biden Gives $53M to Restore Ukraine's Energy

Large Number of Criminal Juveniles Entering US Through DACA

Zeldin RNC Bid Gains Momentum as Party Leaders Line Up Behind Him (Replace RINO Ronna Romney McDaniel)

Lawyer Who Sought to Defend Trump Dies Suddenly at 48

Florida Takes $2 Billion Away From BlackRock Due To Firm's Activist Investing Standards

DEROY MURDOCK: Electing Herschel Walker Is More Important Now Than Ever

Report, Ronna McDaniel Pulls Ground Resources from Arizona Motivated by RNC Power Challenge

Hired by the RNC, Harmeet Dhillon Teams Up with the Mitch McConnell Contracted Enforcer Who Destroyed the Tea Party

America-Last RINO Kevin McCarthy Attended State Dinner With Hunter Biden and Emmanuel Macron

What does the Bible say about cryonics or cryogenics?

(Warning this article is by a loon)By 2030, We Will be able to Prevent Most Disease And Arrive on Mars, the New Earth with No Seas

4. The Murder Rate and O.D. Rates Will Double In Most U.S. States

Zelensky Says EU's €18 Billion Aid Is What "True Solidarity" Looks Like

Oops! $20B Sent to Ukraine Is Unaccounted for

20 NATO States "Pretty Tapped Out" After Weapons Transfers To Ukraine

Two Oath Keepers, Including Founder Stewart Rhodes, Found Guilty Of Jan. 6 Seditious Conspiracy

US Tech Workers Kiss More Jobs Goodbye -The Eagle Act's Back

Democrat Adam Schiff Suggests Complying With Subpoenas is Optional, Now

Zero Republican Professors Found Across 33 Departments at Seven Universities: College Fix Analysis

Kristi Noem Bans TikTok Use On South Dakota State Devices

Arizona Official Certifies Election 'Under Duress', Says He's Under Threat of Arrest If He DoesnÂ’t Comply


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: Spies Can Track You Just by Watching Your Phone’s Power Use
Source: [None]
URL Source: http://www.scribd.com/doc/256304846 ... g-Mobile-Device-Power-Analysis
Published: Feb 19, 2015
Author: ANDY GREENBERG
Post Date: 2015-02-19 23:43:45 by A K A Stone
Keywords: None
Views: 1391
Comments: 6

Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption.

Researchers at Stanford University and Israel’s defense research group Rafael have created a technique they call PowerSpy, which they say can gather information about an Android phone’s geolocation merely by tracking its power use over time. That data, unlike GPS or Wi-Fi location tracking, is freely available to any installed app without a requirement to ask the user’s permission. That means it could represent a new method of stealthily determining a user’s movements with as much as 90 percent accuracy—though for now the method only really works when trying to differentiate between a certain number of pre-measured routes.

Spies might trick a surveillance target into downloading a specific app that uses the PowerSpy technique, or less malicious app makers could use its location tracking for advertising purposes, says Yan Michalevski, one of the Stanford researchers. “You could install an application like Angry Birds that communicates over the network but doesn’t ask for any location permissions,” says Michalevski. “It gathers information and sends it back to me to track you in real time, to understand what routes you’ve taken when you drove your car or to know exactly where you are on the route. And it does it all just by reading power consumption.”

PowerSpy takes advantage of the fact that a phone’s cellular transmissions use more power to reach a given cell tower the farther it travels from that tower, or when obstacles like buildings or mountains block its signal. That correlation between battery use and variables like environmental conditions and cell tower distance is strong enough that momentary power drains like a phone conversation or the use of another power-hungry app can be filtered out, Michalevsky says.

One of the machine-learning tricks the researchers used to detect that “noise” is a focus on longer-term trends in the phone’s power use rather than those than last just a few seconds or minutes. “A sufficiently long power measurement (several minutes) enables the learning algorithm to ‘see’ through the noise,” the researchers write. “We show that measuring the phone’s aggregate power consumption over time completely reveals the phone’s location and movement.”

Even so, PowerSpy has a major limitation: It requires that the snooper pre- measure how a phone’s power use behaves as it travels along defined routes. This means you can’t snoop on a place you or a cohort has never been, as you need to have actually walked or driven along the route your subject’s phone takes in order to draw any location conclusions. The Stanford and Israeli researchers collected power data from phones as they drove around California’s Bay Area and the Israeli city of Haifa. Then they compared their dataset with the power consumption of an LG Nexus 4 handset as it repeatedly traveled through one of those routes, using a different, unknown choice of route with each test. They found that among seven possible routes, they could identify the correct one with 90 percent accuracy.

“If you take the same ride a couple of times, you’ll see a very clear signal profile and power profile,” says Michalevsky. “We show that those similarities are enough to recognize among several possible routes that you’re taking this route or that one, that you drove from Uptown to Downtown, for instance, and not from Uptown to Queens.”

Michalevsky says the group hopes to improve its analysis to apply that same level of accuracy to tracking phones through many more possible paths and with a variety of phones—they already believe that a Nexus 5 would work just as well, for instance. The researchers also are working on detecting more precisely where in a known route a phone is at any given time. Currently the precision of that measurement varies from a few meters to hundreds of meters depending upon how long the phone has been traveling.

The researchers have attempted to detect phones’ locations even as they travel routes the snooper has never fully seen before. That extra feat is accomplished by piecing together their measurements of small portions of the routes whose power profiles have already been pre-measured. For a phone with just a few apps like Gmail, a corporate email inbox, and Google Calendar, the researchers were able determine a device’s exact path about two out of three times. For phones with half a dozen additional apps that suck power unpredictably and add noise to the measurements, they could determine a portion of the path about 60 percent of the time, and the exact path just 20 percent of the time.

Even with its relative imprecision and the need for earlier measurements of power use along possible routes, Michalevsky argues that PowerSpy represents a privacy problem that Google hasn’t fully considered. Android makes power consumption data available to all apps for the purpose of debugging. But that means the data easily could have been restricted to developers, nixing any chance for it to become a backdoor method of pinpointing a user’s position.

Google didn’t respond to WIRED’s request for comment.

This isn’t the first time that Michalevsky and his colleagues have used unexpected phone components to determine a user’s sensitive information. Last year the same researchers’ group, led by renowned cryptographer Dan Boneh, found that they could exploit the gyroscopes in a phone as crude microphones. That “gyrophone” trick was able to to pick up digits spoken aloud into the phone, or even to determine the speaker’s gender. “Whenever you grant anyone access to sensors on a device, you’re going to have unintended consequences,” Stanford professor Boneh told WIRED in August when that research was unveiled.

Stanford’s Michalevsky says that PowerSpy is another reminder of the danger of giving untrusted apps access to a sensor that picks up more information than it’s meant to. “We can abuse attack surfaces in unexpected ways,” he says, “to leak information in ways that it’s not supposed to leak.”

Read the full PowerSpy paper below.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

The spies who track me are very bored men.

Vicomte13  posted on  2015-02-20   6:37:03 ET  Reply   Trace   Private Reply  


#2. To: A K A Stone (#0)

I would bet that Google is recording tower signal strength for this purpose as it rolls its mapping cars around the country, the same way they record your router's MAC address and SSID.

Tooconservative  posted on  2015-02-20   7:32:09 ET  Reply   Trace   Private Reply  


#3. To: Vicomte13 (#1)

The spies who track me are very bored men.

I wonder how many in the old Soviet Union said the same exact thing.

I hear people say this constantly. It's quite annoying.

Tooconservative  posted on  2015-02-20   7:39:39 ET  Reply   Trace   Private Reply  


#4. To: TooConservative (#3)

I wonder how many in the old Soviet Union said the same exact thing.

I hear people say this constantly. It's quite annoying.

In this country the authorities will plant drugs on you, guns in your car, and child porn on your computer if they want to "get" you. Nobody who itemizes business expenses can stand up to a hostile audit of his life's finances, and there is no statute of limitations on tax fraud. The sins of our youth can be brought back up and thrown in our faces at any time, and given the general relaxing of statute of limitations, things long forgotten can be renewed, and things that never happened can be "proven" by manufactured evidence.

Therefore, to spy assiduously on a middle class wage slave is quaint and wasteful. They don't need to have the TRUTH to imprison us, and they can execute us by cop ("He was resisting") any time they want to. Our political system is corrupt: as you have well noted no third party is possible, and trying to accomplish any fundamental change through either of the two bought- and-paid-for crony capitalist parties is like the gerbil trying to get somewhere on that wheel. The effort is entirely a waste.

What, then, to do?

Well, there are two tracks: the Long March track, which starts very St. Francis Peace Prayer style: Let there be peace on earth, and let it begin with me.

And then there's the high track, the Lottery Win track, which is really just the same thing but rapidly expanded to cover other people. Perhaps I should make a whole thread about this, and call it Vicomte de Mores or something like that, and invite you and start. You'll demur and protest, but you'll read: I know you. My spy will too. Maybe he'll even be persuaded and join the fiefdom. After all, it was Putin who put together guards to fend off the KGB guys in their attempted coup in St. Petersburg at the end of Gorbachev's reign.

Vicomte13  posted on  2015-02-20   10:42:56 ET  Reply   Trace   Private Reply  


#5. To: Vicomte13 (#4)

After all, it was Putin who put together guards to fend off the KGB guys in their attempted coup in St. Petersburg at the end of Gorbachev's reign.

The Gorbachev coup was fake.

A K A Stone  posted on  2015-02-20   10:54:27 ET  Reply   Trace   Private Reply  


#6. To: A K A Stone (#5)

The Gorbachev coup was fake.

So is our Rule of Law.

Vicomte13  posted on  2015-02-20   12:49:46 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com