09-26-2020, 02:41 PM
This thread got me curious so I replaced the url parameter of the geoclue.conf with my own server and made a simple script to read the POST:ed data and save it to a file. So far I have seen long lists of WiFi access points.
I believe it is very easy to fingerprint this data and follow someone around as WiFi networks would disappear one at a time and others appear. This is more information than I like to share with Mozilla or any of it's partners.
I'm ok with using GPS and it is not clear to me if geoclue is needed for that or not but the setting the url to http://127.0.0.1 should atleast keep external parties out of the loop. As an extra precaution one might also blacklist the known location services in the local DNS resolver to add another layer of defence.
I believe it is very easy to fingerprint this data and follow someone around as WiFi networks would disappear one at a time and others appear. This is more information than I like to share with Mozilla or any of it's partners.
I'm ok with using GPS and it is not clear to me if geoclue is needed for that or not but the setting the url to http://127.0.0.1 should atleast keep external parties out of the loop. As an extra precaution one might also blacklist the known location services in the local DNS resolver to add another layer of defence.