“App developers can encrypt these messages when they’re stored (in transit they’re protected by TLS) but the associated metadata – the app receiving the notification, the time stamp, and network details – is not encrypted.”

  • Gravitywell@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    9 months ago

    How is getting a push notification any better at tracking someone than the actual gps and tower data that their phone is CONSTANTLY sending out to their cell providers?

    Seems really overblown, like most people hearing this assume it’s including contents of the notifications but it doesn’t, and if law enforcement wants to put a suspect at a crime scene, they can just get the data from T-Mobile, if it gets to the point they’re asking Google or Apple for info, id be much more concerned about all the data and emails stored on the cloud, which they already have no problems giving out.

    Am I missing something? What can law enforcement gain from push notification data that they can’t get with data from the cell provider already or the wealth of other data collected by Gmail, maps, Uber, etc, which is way more useful than anything a push notification would contain.

    Not defending the practice of course, I don’t get push notifications because I don’t have Google apps installed on my grapheneOS phone, but I’m pretty sure T-Mobile knows my location just as well.

    • bobs_monkey@lemm.ee
      link
      fedilink
      arrow-up
      14
      ·
      9 months ago

      I think the whole thing is that it’s a class of data that has very few privacy protections on it and is therefore more easily accessible by assholes

      • Gravitywell@sh.itjust.works
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago

        If we’re talking about these agencies subpoenaing in order to get the data, that kinda sounds like privacy protections are in place for it. I think whats really happening here is that push data is now one of a hundred or so other things (like emails, google/app maps data, web search history), that’s now being included when agencies make requests for a users data… they arent specifically going after push notifications any more then they’re going after how many steps your fitbit is counting, they just want all the information they can get, and by voluntarily giving it to these companies we put ourselves at risk, its a very distopian trade off.

    • ryannathans@aussie.zone
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      You can even read message contents sometimes. You know what apps they are using and can precisely correlate messages with those services

      • RandoCalrandian@kbin.social
        link
        fedilink
        arrow-up
        2
        ·
        8 months ago

        This.

        If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.

        That’s just one valuable use of this data.

      • Gravitywell@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        9 months ago

        So assuming the app isnt E2EE then there would be many ways to read message contents, for example if the subpoena your email provider, or SMS provider. Google play store and apple store again also already have all the details of what apps you use, how often you update them or when you removed them… There is just no benefit to using push for this kind of data gathering, there is always one or more much better ways of obtaining any of this data… wanna know when a woman left the state to go to health clinic? Cell towers. Husband suspected of murdering wife and you want to know what dating apps he used? Google play store has logs of every dating app they joined, and all those dating apps will gladly hand over chat logs and other data to proper authorites when asked nicely… And its not like the pushnotifications themselves are just open air unencrypted broadcasts anyone can monitor, Law enforcment at the very least has to submit the requests to google and apple anyway, so why would they care about push notifications when they can get access to a suspects entire cloud storage and emails?

        I’ll bet whats really happening here isnt even that cops are “super interested” in push data, but rather they realized that its one of many forms of data that they include when make a request. I’d bet tey also grab any kind of “fitness” related data , and things like your advertising preferences too, because why not? Investegators don’t usually go around asking for just the bare minimum they need to incriminate someone or prove an allegation, they just fill out the data request form and check “all of the above”.

        Go look at how many different options google takeout has, and imagine they probably have a few bonus ones just for law encforcment, Push notifications is just a drop in the bucket in terms of the data that we’re all giving away freely by depending on the duopoly of google/apple for all our mobile communications.

        • RandoCalrandian@kbin.social
          link
          fedilink
          arrow-up
          0
          ·
          8 months ago

          Using weak examples and how they are better served in a different way doesn’t mean much

          With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata

          They are demanding this for a reason

          • Gravitywell@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            8 months ago

            That’s actually a really good point I hadn’t thought of. I still think other data would be more useful, but your example is the first one I’m hearing that maybe could have work if they had no other data to work with

    • sadreality@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      8 months ago

      You are discussing two different things. Just because they can use cell data, it does justify additional needless spying.

      At least with cell data there is veneer of that’s only way to do it. Here our dear corpo tech lords could just make a product that does [not] leak data but they chose not to… why do we pay for such treatment?