Revelations that iPhones, iPads and other Apple iOS devices track your whereabouts have led a Cornell University professor to warn mobile device users about what they're sacrificing to use such gadgets Revelations that iPhones, iPads and other Apple iOS devices track your whereabouts have led a Cornell University professor to warn mobile device users about what they’re sacrificing to use such gadgets.“It is vitally important to recognize that cellular telephony is a surveillance technology, and that unless we openly discuss this surveillance capability and craft appropriate legal and technological limits to that capability, we may lose some or all of the social benefits of this technology, as well as a significant piece of ourselves,” says Stephen Wicker, Cornell professor of electrical and computer engineering. “Most people don’t understand that we’re selling our privacy to have these devices.”As reported yesterday, two programmers presented details at a conference of an iOS 4.0 database file, usually unencrypted, created on the iPhone (or iPad or touch) and then synced to a user’s Mac. This file contains thousands of time-stamped latitude and longitude pairings, apparently based on cell tower triangulation calculations.BACKGROUND: Apple iPhone location tracking has been no secret, researcher claims Beyond possible security risks, one major concern about revealing private data through smartphones and other mobile devices is how direct marketers will exploit it. Wicker cites Direct Marketing Association data showing nearly $150 billion spent on direct marketing in 2009, which was converted into a trillion-plus dollars in revenue.(New efforts in context-based computing are even putting IT staff in the position of exploiting such data, as we reported from a Gartner conference last fall) “Back in the day when designers designed the cellular system, none of designers took privacy into account – they unintentionally created databases that accumulated a lot of information that is now being exploited by service providers and law enforcement (See: “State police can suck data out of cell phones in under two minutes”),” Wicker says. “We can create cellular systems that don’t create such databases.”Read more about anti-malware in Network World’s Anti-malware section. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe