Readit News logoReadit News
abetusk · a year ago
Strava is a fitness app. So, apprently, the security detachment of political figures tends to use the app, presumably because they're into fitness and keep in shape, and their location can be tracked through the app.

As the security detachment tend to travel with the people they protect, political leaders locations can be inferred.

The article talks about body guards not being allowed to use social media/apps while on the job, they allow for provisions on use when not on active duty. So, I guess, the guards get a day off, use the app, wherever they are, broadcasting their location.

Crazy stuff.

kkielhofner · a year ago
Shouldn't be much of a surprise, this made news back in 2018 when the same was realized with soldiers and secret military bases:

https://www.theguardian.com/world/2018/jan/28/fitness-tracki...

loeg · a year ago
More specifically, it's a social network for sharing workout data. Sharing data is like, first and foremost what it's about. It has the same privacy controls you'd expect of social networks (public/friends/private both globally and per post/activity) as well as some that are special to a location-sharing app (hidden addresses).

This was either a gap in social media policy set for the guards, or a violation of that policy on the part of the guards.

netsharc · a year ago
Yeah, the targetting isn't that difficult, I guess. If you know crown prince Akeem Joffer was in New York 5 days ago, and is in Paris 3 days ago, you can probably diligently query Strava users who weren't in New York for a long time but showed up 5 days ago, and see if they showed up in Paris 3 days ago, and boom, you've found a member of his entourage.

Even if they use the anonymizing feature that masks their start/end points, if you find a few other members, you could be able to triangulate a big hotel near them and guess that that's where the crown prince stayed... and the next time you hear he's coming to NY/Paris, you have this information.

mandevil · a year ago
Cell phone tracking is better at surveillance than the best stuff the military has.

https://www.washingtonpost.com/national-security/2024/02/22/... has a fun story about a time at Fort Irwin (US Army laser tag in the desert) one side couldn't figure out how an attack helicopter got through their defenses, until they did some queries on a commercial cell phone tracking database and found the cellphone moving across the desert at 120mph. Hole identified, plugged for the next round.

And also talks about how the Ukrainians and Russians are having a great deal of trouble with cell phone OPSEC even after years of shooting war.

jklinger410 · a year ago
Cell phone tracking _is_ what the military has.

Seeing through walls with WiFi is better. Or slurping up the main pipes and decrypting it. Which they also have.

wildzzz · a year ago
An old coworker used to work on what is basically a Stingray for air platforms with some sort of directional finding capability. Presumably, you'd strap it to a drone and fly it over villages where you suspect bad guys are. Do this every few days and in multiple locations and you'd establish patterns of movements and links between networks of people.
giraffe_lady · a year ago
Or where journalists or doctors are. The technology is neutral, after all.
thebruce87m · a year ago
For anyone else struggling to understand this initially, they were able to tell the flight path of the attack helicopter as it evaded detection by looking at the historic path of a phone of a person that was on the helicopter.

It wasn’t a helicopter spoofing itself as a phone or something crazy like that.

taeric · a year ago
Probably not better than the best stuff the military has... Still really good, mind.

And, yeah, unintended uses are usually prime locations for security breaches. For a long time (maybe still?) metadata on pictures that people post would reveal far more than people meant. Thumbnails of cropped pictures, even.

FactKnower69 · a year ago
>Probably not better than the best stuff the military has...

Military tech is always a decade ahead of civilian, that's why the US has easily won every armed conflict they've entered into in the past 50 years

cj · a year ago
Related:

Strava heatmap can be used to locate military bases - https://news.ycombinator.com/item?id=16249955 - Jan 2018 (271 comments)

Turns out soldiers enjoy tracking their runs around the base!

OgsyedIE · a year ago
The simplest solution to this is bureaucratic. Establish an app approval cybersecurity office within some agency and have the office make two lists: apps that have specific security configurations that need to be enabled and apps that are outright banned.

Then you just make compliance with the lists necessary for certain security clearances.

Muromec · a year ago
Nononon, you make one list:

- apps that are allowed to be installed, pinned by version with a person responsible for monitoring them

r00fus · a year ago
This is why I only use Strava to share with my followers.

Yes, it's an extra step after my workout to edit, add pics if any, choose my activity level if I was too lazy to put on my HR monitor, and then only post to my followers.

Yes, this means I get less likes and can't participate in challenges etc. But it's really about sharing with my colleagues and friends so they can motivate me for my next ride.

marcellus23 · a year ago
You can set your activities to be private by default, you don't need to change it for every activity individually after you upload it.
r00fus · a year ago
Yes, mine are. I explicitly share some activities.
tonymet · a year ago
I wouldn’t trust their security restrictions. Their API and authentication is primitive. For a while I ran a basic bot to automate data extraction. Their security is 20+ years behind other social networks .

You likely have bot followers and API calls that can read your latest activity GPX data

loeg · a year ago
Facebook is barely 20 years old. No active social network is "20+ years" advanced of any other, because it's longer than their entire history.
soco · a year ago
It's not clear to me whether the location was made using the public, as in shared, information, or information set as private. So did they masquerade as followers, or hacked the system?
zardo · a year ago
> This is why I only use Strava to share with my followers.

You travel with one of the most powerful people in the world?

loeg · a year ago
You're a bodyguard for a head of state? Probably no one cares about your location.
r00fus · a year ago
This kind of attitude is why we get such bad IoT security.

Everyone deserves privacy - just like with Facebook, a bad actor watching your profile could infer your movements on Strava (or lack thereof) and use that to break into your home or steal your ride.

wslh · a year ago
Other sources: Haaretz Investigation: Intelligence Operation Collected Information on Sensitive Israeli Bases, Soldiers <https://www.haaretz.com/israel-news/security-aviation/2024-1...> <https://archive.is/2024.10.29-113518/https://www.haaretz.com...>
TrevorJ · a year ago
Not sure if the format for this article is standard these days, but oh man do I hate it.
davidsawyer · a year ago
Reads like a remix of how Axios articles are.
tonymet · a year ago
Strava has suffered from this and had known attacks for 10+ years now. There was a famous case around Colorado of a mistaken doxxing attack driven by Reddit. Due to mistaken identity, attackers pursued an innocent victim using their Strava account. The Strava location was the cause of both the mistaken identity case and abused to find and dox the victim.

Strava’s anonymization algorithm (the bubble feature) is primitive and trivially de-anonymized with basic triangulation.

The company has never adequately responded to privacy concerns despite many abuse cases.

loeg · a year ago
> Strava’s anonymization algorithm (the bubble feature) is primitive and trivially de-anonymized with basic triangulation.

That is not true. It picks a single random centroid near your privacy location and does the privacy feature based on that. Triangulation finds the random centroid, which is crucially not your hidden location.

mariusor · a year ago
That's something I didn't know, but even like that, it narrows down the area.
paganel · a year ago
People should just stop using Strava, or at least stop making their Strava data public to the world (not sure if that's an option cause I've never used that app). They should just run/cycle, whatever, forget about gps.
loeg · a year ago
> not sure if that's an option cause I've never used that app

You can make your account private, or individual activities private (including by default).

tonymet · a year ago
Strava doesn’t even know who has access. They seem to be doing little to know auditing of security access.