Friday, February 8, 2019

Turning off gps tracking doesn't mean a thing

Many people are worried about their personal information and rightfully so, with so much in the media regarding theft and other issues who wouldn't be? Many people might say they get peace of mind knowing that they have disengaged their gps location services.

Do you ever wonder how facebook or other services still know where you are? It's not a mystery it's all in the technology. When you retrieve information using your phone you have to communicate to an ip address somewhere, right there you are already located and a location can be triangulated. Every message requires three things, without them there is no effective communication. The equation of the communication in every situation is the same. You must have a message to send without it the equation would be incomplete. The other necessary requirements are a sender, the one sending the communication and by now you may have already guessed the final piece of the equation. To complete the sequence you must have a receiver to accept the message. A teacher and mentor of mine who recently passed away was the person who taught me this and I can never forget it. This equation sounds simple but without it all computing electronically would not exist.  Technology all works using a "handshake" between the sender and receiver of the message.



The TLS Handshake Protocol involves the following steps:
  1. The client sends a "Client hello" message to the server, along with the client's random value and supported cipher suites.
  2. The server responds by sending a "Server hello" message to the client, along with the server's random value.
  3. The server sends its certificate to the client for authentication and may request a certificate from the client. The server sends the "Server hello done" message.
  4. If the server has requested a certificate from the client, the client sends it.
  5. The client creates a random Pre-Master Secret and encrypts it with the public key from the server's certificate, sending the encrypted Pre-Master Secret to the server.
  6. The server receives the Pre-Master Secret. The server and client each generate the Master Secret and session keys based on the Pre-Master Secret.
  7. The client sends "Change cipher spec" notification to server to indicate that the client will start using the new session keys for hashing and encrypting messages. Client also sends "Client finished" message.
  8. Server receives "Change cipher spec" and switches its record layer security state to symmetric encryption using the session keys. Server sends "Server finished" message to the client.
  9. Client and server can now exchange application data over the secured channel they have established. All messages sent from client to server and from server to client are encrypted using session key.

To complete the TLS in this instance while accessing wireless network connectivity your phone has no option but to communicate with a network. Networks use electronic resonance to create waves that are transmitted repeatedly to hit mobile devices or wireless connected devices on a wifi network for example. The communication equation remains the same as always as we know from my earlier explanation. All computing begins with binary code which is at it's basic form a sequence of '0''s and '1'''s that represent every single command or display rapidly. Color for instance is represented by individual binary code which will indicate to your computer screen what each pixel should display. Computers are much faster these days but you will experience lagging when accessing a program or function with a high binary conversion sequence. This is why a high definition video clip may load longer online or has a larger file size compared to a picture for example. When data is communicating across a cable the 0's and 1's are represented by a hot signal and a cold signal sending rapidly to represent to 0 or 1. Fiber Optic communication is literally as fast as the speed of light. The fiber shoots a light to represent the data and can communicate the sequence of 0's and 1's by flashing the sequence quickly across the line. Vibrations on cat6 and cat5 cables can interrupt some computing sequences by accidentally sending an improper code or partial sequence and the receiving communicator may have a hard time understanding it completely or it may reduce the speed of the conversions rapidly. Because of this issue, you may experience connection speeds that are slow or shut off during inclement weather that may effect physical internet cables in the neighborhood.   Wireless communication works exactly the same way but the 0's and 1's are received via resonance waves being transmitted from a tower. Because of the way that the law of TLS and communication function, you will never fully be able to remove your location as long as the device communicates at any time anywhere in the world. Shutting off GPS function on a cellular device will not stop your phone from accessing cell tower data. The only way you can truly remain undetected is to have no device at all. Airplane mode may reduce your location scouting temporarily, but your previous location and future location will be known.

So turning off your gps actually does limit the data in between secondary applications and services on your mobile device but will not actually remove you from anyones eyes, your tinder might just not function right.We wanted to be more connected, this is the only way.

No comments:

Post a Comment

I just went into the Deep Web: the black market is full of drugs and social security numbers

 I just went into the deep web, sometimes called the dark web. It is a scary place. Let me start off by saying you will not find more illega...