According to this unsourced report, the Belarusian mobile operators have cooperated with the country's secret police to provide a list of everyone who was in the vicinity of an anti-government demonstration; the spooks are now calling in everyone on the list to interview them about their involvement in political dissidence. I'd love to see a better-sourced version of this article, but it's technically possible for the operators to have logged every phone near a given tower at a given time.
This is one area where I really agree with Evgeny Morozov, who has written extensively about the risks that technology use poses to demonstrators: at present, mobile phones are not fit for purpose. Mobiles are too closed, the mobile operators too vulnerable to be considered safe enough for use against powerful hostile states. Unless your mobile-driven protest ends with the collapse of the state, it's all too likely that you and your friends will face dire reprisals.
It's one of the reasons I'm so anxious to see more free/open phone operating systems, which open up possibilities for IMEI spoofing, anonymizing tunnels through proxies, etc. But until there's widespread adoption of open handsets, your phone is eminently capable of finking you out.
Mobile operators rat out all demonstrators
Super Retro-Boy is a compact, minimal reimplementation of Nintendo’s classic Game Boy with the look as well as the tech. It plays real cartidges, including those from the full-color Game Boy Advance—presumably this is why there are four buttons. It gets 10 hours on a charge, and will come with a 10-in-1 game from Retro-Bit […]
A T-Mobile customer in Florida drove her SUV into the store, smashing through the front window and coming to a stop deep in the showroom. Then she emerged from her disabled vehicle, hefted a broken window frame, and smashed a display. “What is wrong with her?” calls out an unseen observer. According to witnesses who […]
Slovenia’s Maheno corporation manufactured a series of Barbie-branded and white label typewriters for kids, with a hidden feature that allowed their owners to use them to produce messages encrypted with a simple substitution cipher.
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]
One of the best ways to progress a career in project management is through earning recognized certifications. These certifications carry significant clout and don’t require expensive tuition or student loans. This Ultimate Project Management Certification Bundle is a great example of an affordable way to get ahead. It includes training for 9 certifications including PMP, […]