Location tracking Location tracking Engineering & Public - - PowerPoint PPT Presentation

location tracking location tracking
SMART_READER_LITE
LIVE PREVIEW

Location tracking Location tracking Engineering & Public - - PowerPoint PPT Presentation

CyLab Location tracking Location tracking Engineering & Public Policy Lorrie Faith Cranor October 14, 2014 y & c S a e v c i u r P r i t e y l b L a a s b U o 8-533 / 8-733 / 19-608 / 95-818: b r a a


slide-1
SLIDE 1

1

Location tracking Location tracking

Lorrie Faith Cranor

October 14, 2014 8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab

slide-2
SLIDE 2

2

Today’s agenda

  • Quiz
  • Questions/comments about the readings
  • Locating Technologies
  • Location-Sharing Applications and Privacy

Controls

  • How private can location data be?
  • Protecting location privacy and privacy

controls

slide-3
SLIDE 3

3

By the end of class you will be able to:

  • Understand how location tracking works
  • Understand the difficulties in protecting

location privacy and some strategies that can help

  • Understand how privacy controls can help
slide-4
SLIDE 4

4

Locating Technologies

slide-5
SLIDE 5

5

Global Positioning System

slide-6
SLIDE 6

6

WiFi Positioning

slide-7
SLIDE 7

7

Cellular Triangulation

slide-8
SLIDE 8

8

IP Location

slide-9
SLIDE 9

9

Location-Sharing Applications and Privacy Controls

slide-10
SLIDE 10

10

Privacy features

  • Most current location sharing services allow

sharing to be either on or off, per person

  • Many have a “make me invisible feature” (e.g.

Loopt and Brightkite)

  • Some have the ability to limit by location

granularity (e.g. Google Latitude and FireEagle)

  • Commercial services don’t have fine-grained

privacy controls or ability to see who is tracking your location

slide-11
SLIDE 11

11

Loopt privacy settings

slide-12
SLIDE 12

12

Loopt privacy settings

slide-13
SLIDE 13

13

Google Lattitude privacy settings

slide-14
SLIDE 14

14

Google Lattitude privacy settings

slide-15
SLIDE 15

15

Google Lattitude privacy settings

slide-16
SLIDE 16

16

Location-Sharing Applications

  • Reviewed 89 Applications in August 2009

– Date of Launch – Privacy Policy – Privacy Controls – Immediately Accessible Privacy Settings

slide-17
SLIDE 17

17

Privacy Overview

  • Types of Applications

– Open: Requested by anyone (52) – Closed: Requested by friends only (29)

Category Yes No Unknown Not ¡Applicable Privacy ¡Policy 66% 34%

  • ­‑
  • ­‑

Privacy ¡Controls 76% 17% 1% 6% Accessible ¡Privacy ¡ SeAngs 17% 75% 2% 6%

slide-18
SLIDE 18

18

Types of Restrictions

  • Friends Only (49.4%)
  • Granularity (11.2%)
  • Blacklist (15.7%)
  • Invisible (33.7%)

% of applications

slide-19
SLIDE 19

19

Types of Restrictions

  • Per-Request (2.25%)
  • Time-Expiring (2.25%)
slide-20
SLIDE 20

20

Most Frequent Controls

  • Friends Only (49.4%)
  • Invisible (33.7%)

% of applications

slide-21
SLIDE 21

21

Privacy Controls

  • Frequency of Restrictions
slide-22
SLIDE 22

22

Best ways to mitigate the greatest expected risks

  • Blacklist (16%)
  • Granularity (12%)
  • Group-based rules (12%)
  • Location-based rules (1%)
  • Time-based rules (1%)

% of applications

slide-23
SLIDE 23

23

Recommendations for developers

  • Need for more expressive privacy controls

in most applications

  • Providing expressive controls could reduce

concerns

  • Developers must balance expressiveness

and user burden

slide-24
SLIDE 24

24

Recommendations for users

  • Understand why you want to use location-

sharing application (social, coordination, etc.)

  • Find application well-suited to your needs
  • Configure privacy controls
  • Avoid public posting of your location with

your real name

slide-25
SLIDE 25

25

http://locaccino.org

slide-26
SLIDE 26

26

slide-27
SLIDE 27

27

slide-28
SLIDE 28

28

slide-29
SLIDE 29

29

slide-30
SLIDE 30

30

slide-31
SLIDE 31

31

slide-32
SLIDE 32

32

slide-33
SLIDE 33

33

slide-34
SLIDE 34

34

slide-35
SLIDE 35

35

slide-36
SLIDE 36

36

slide-37
SLIDE 37

37

slide-38
SLIDE 38

38

slide-39
SLIDE 39

39

slide-40
SLIDE 40

40

http://locaccino.org

slide-41
SLIDE 41

41

Limits on anonymizing location data

  • Why is it difficult to anonymize location

data?

  • How unique is location data?
slide-42
SLIDE 42

42

Protecting location privacy

  • What strategies can we use to protect

privacy while gaining utility from location data?

– Monitoring highway traffic flow – Find the nearest X – Friend finder

slide-43
SLIDE 43

43

Group discussion on location privacy controls

  • When would you find it useful to share your

location with an app, website, or friend?

  • When would you not want to share your

location?

  • Specify a set of rules for sharing your

location

– What attributes are the rules based on? – How many rules do you need?

slide-44
SLIDE 44

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab