Search the Community
Showing results for tags 'track'.
Am gasit aceasta extensie prin intermediul careia poti sa localizezi prietenii de pe Facebook, functioneaza doar pe utilizatorii de smartphone, tablete etc. care folosesc Facebook messenger si au locatia activata. 1. Descarcati de aici: https://github.com/arank/marauders-map, dezarhivati. 2. Creati un cont pe https://www.mapbox.com/ 3. Intrati in folderul dezarhivat, in src/fb/content.js si modificati ce urmeaza dupa urmatoarele linii: L.mapbox.accessToken si map_id cu ceea ce a fost generat in contul creat anterior 4. In Google Chrome, mergeti la Setari, Extensii si bifati Mod pentru dezvoltatori, apoi Incarca extensia neimpachetata. Redeschideti Chrome. 5. Acesati https://www.facebook.com/messages, selectati o conversatie din stanga, apoi in stanga jos va trebui sa apara o harta cu locatia userului respectiv. Am testat pe 3 persoane si mi-a afisat locatia aproape perfect, persoana respectiva trebuie sa aiba locatia activata.
As Ars has previously reported, documents passed to journalists by former National Security Agency contractor Edward Snowden have shown that the NSA and its British counterpart agency, the GCHQ, have exploited privacy "leaks" in mobile applications (including Rovio's Angry Birds) to track individuals of interest. A new document recently published by Der Spiegel provides further details on just how much the GCHQ was able to extract from mobile data to keep tabs on those it targeted for surveillance. The British agency used a program referred to as BADASS to suck up data emitted from Angry Birds and other apps, and the information was so granular, analysts could even track how well (or poorly) a person was doing playing. BADASS is an acronym for "BEGAL Automated Deployment And Survey System," and the system pulled in data from GCHQ and NSA network taps identified as mobile analytics and advertising traffic. Among other things, this data included Google "pref" cookies (such as those used by Ars to identify users in our own passive network surveillance testing with NPR) and Flurry application analytic data used by developers to track usage and performance of their mobile apps. User location data and activity could also be monitored based on the data stream, allowing analysts to pinpoint an active user within minutes, according to the GCHQ presentation from 2011. Much of this data was easily tracked because the mobile apps did not encrypt data in transit, leaving data exposed to anyone who might be able to monitor the network. That's still the case for many of these analytics and advertising services. Source