this post was submitted on 24 Oct 2024
494 points (99.4% liked)

Technology

59377 readers
5724 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Drunemeton@lemmy.world 84 points 3 weeks ago (15 children)

One thing I am always aware of are apps that want permission to access Bluetooth and/or Wi-Fi and/or Networks.

Even though Bluetooth is very short ranged it can still be used to tie you into a location within a database based on other database records that are more detailed.

Yeah, I love playing you “My Great Dog-sitting Simulator” (not a real app) but you do not need access to my BT. The OS handles sending your audio to my headphones!

[–] asbestos@lemmy.world 39 points 3 weeks ago (8 children)

Teams is the worst, you can’t join any call if you don’t allow it to scan your local network. I wish the executives a very nice and agonizing death.

[–] toynbee@lemmy.world 20 points 3 weeks ago (2 children)

I haven't done an extensive survey or anything, but every modern router I've interacted with supports setting up a secondary WiFi network with guest isolation (so anything on that SSID can't see any network device besides the router and itself). This is useful for apps or hardware that is untrusted and/or demands unjustified permissions.

[–] asbestos@lemmy.world 6 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Correct, using the guest network is better but I think turning off WiFi and just using mobile data is sufficient. I wonder if the permission applies to cellular connectivity as well.

[–] toynbee@lemmy.world 4 points 3 weeks ago

Sure, removing your network from the equation is definitely a more secure option; just make sure the app isn't using those granted permissions in the background when you're done using it and log back into your network.

load more comments (5 replies)
load more comments (11 replies)