Overview of all pages with the tag #Tracking the Trackers, such as: Scanning apps, off the record| Guardian Project
Overview of all pages with the tag #Open Source, such as: 7ASecurity Completes Security Audit of Círculo| Guardian Project
Overview of all pages with the tag #Nlnet, such as: The Search for Ethical Apps: Let's start with governments| Guardian Project
Overview of all pages with the tag #Ngi0 Pet, such as: New Data Sources: API Key Identifiers and BroadcastReceiver Declarations| Guardian Project
Overview of all pages with the tag #Debian, such as: Debian over HTTPS| Guardian Project
Overview of all pages with the tag #Usability, such as: First Time Using CalyxOS Review| Guardian Project
Overview of all pages with the tag #Android, such as: IOCipher 1.0 community reboot| Guardian Project
Overview of all pages with the tag #Tracking, such as: The Search for Ethical Apps: Let's start with governments| Guardian Project
Overview of all pages with the tag #Privacy, such as: 7ASecurity Completes Security Audit of Círculo| Guardian Project
Overview of all pages with the tag #Fdroid, such as: A Look Back at 2024: F-Droid's Progress and What’s Coming in 2025| Guardian Project
Overview of all pages with the tag #F Droid, such as: A Look Back at 2024: F-Droid's Progress and What’s Coming in 2025| Guardian Project
Overview of all pages with the tag #Clean Insights, such as: Privacy Preserving Analytics in the Real World: Mailvelope Case Study| Guardian Project
Smart phones have brought us so many wonderful capabilities. They let people around the world access vast realms of information. They let app developers solve problems large and small in a way most relevent to their local context. They are personal computers for the world. They also have given surveillance capitalism an unprecedented reach into everyone’s lives. Repressive governments use them in ways that the East German Stasi secret police could only have dreamed of.| Guardian Project
This position paper tries to outline a framework for defining trackers in smart phones and lists mechanisms for identifying them. It hopes to serve as the foundation for the work done in the Tracking-the-Trackers project. In section 1 we start with an abstract analysis of levels of unwanted behaviour in the context of tracking. Next, in section 2, we focus on an attacker’s perspective, on anonymity and pseudonymity. This foundation allows us to define terms which are needed throughout the p...| Guardian Project