<link>http://people.skolelinux.org/pere/blog/</link>
<atom:link href="http://people.skolelinux.org/pere/blog/index.rss" rel="self" type="application/rss+xml" />
+ <item>
+ <title>Creepy, visualise geotagged social media information - nice free software</title>
+ <link>http://people.skolelinux.org/pere/blog/Creepy__visualise_geotagged_social_media_information___nice_free_software.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Creepy__visualise_geotagged_social_media_information___nice_free_software.html</guid>
+ <pubDate>Sun, 24 Jan 2016 10:50:00 +0100</pubDate>
+ <description><p>Most people seem not to realise that every time they walk around
+with the computerised radio beacon known as a mobile phone their
+position is tracked by the phone company and often stored for a long
+time (like every time a SMS is received or sent). And if their
+computerised radio beacon is capable of running programs (often called
+mobile apps) downloaded from the Internet, these programs are often
+also capable of tracking their location (if the app requested access
+during installation). And when these programs send out information to
+central collection points, the location is often included, unless
+extra care is taken to not send the location. The provided
+information is used by several entities, for good and bad (what is
+good and bad, depend on your point of view). What is certain, is that
+the private sphere and the right to free movement is challenged and
+perhaps even eradicated for those announcing their location this way,
+when they share their whereabouts with private and public
+entities.</p>
+
+<p align="center"><img width="70%" src="http://people.skolelinux.org/pere/blog/images/2016-01-24-nice-creepy-desktop-window.png"></p>
+
+<p>The phone company logs provide a register of locations to check out
+when one want to figure out what the tracked person was doing. It is
+unavailable for most of us, but provided to selected government
+officials, company staff, those illegally buying information from
+unfaithful servants and crackers stealing the information. But the
+public information can be collected and analysed, and a free software
+tool to do so is called
+<a href="http://www.geocreepy.com/">Creepy or Cree.py</a>. I
+discovered it when I read
+<a href="http://www.aftenposten.no/kultur/Slik-kan-du-bli-overvaket-pa-Twitter-og-Instagram-uten-a-ane-det-7787884.html">an
+article about Creepy</a> in the Norwegian newspaper Aftenposten i
+November 2014, and decided to check if it was available in Debian.
+The python program was in Debian, but
+<a href="https://tracker.debian.org/pkg/creepy">the version in
+Debian</a> was completely broken and practically unmaintained. I
+uploaded a new version which did not work quite right, but did not
+have time to fix it then. This Christmas I decided to finally try to
+get Creepy operational in Debian. Now a fixed version is available in
+Debian unstable and testing, and almost all Debian specific patches
+are now included
+<a href="https://github.com/jkakavas/creepy">upstream</a>.</p>
+
+<p>The Creepy program visualises geolocation information fetched from
+Twitter, Instagram, Flickr and Google+, and allow one to get a
+complete picture of every social media message posted recently in a
+given area, or track the movement of a given individual across all
+these services. Earlier it was possible to use the search API of at
+least some of these services without identifying oneself, but these
+days it is impossible. This mean that to use Creepy, you need to
+configure it to log in as yourself on these services, and provide
+information to them about your search interests. This should be taken
+into account when using Creepy, as it will also share information
+about yourself with the services.</p>
+
+<p>The picture above show the twitter messages sent from (or at least
+geotagged with a position from) the city centre of Oslo, the capital
+of Norway. One useful way to use Creepy is to first look at
+information tagged with an area of interest, and next look at all the
+information provided by one or more individuals who was in the area.
+I tested it by checking out which celebrity provide their location in
+twitter messages by checkout out who sent twitter messages near a
+Norwegian TV station, and next could track their position over time,
+making it possible to locate their home and work place, among other
+things. A similar technique have been
+<a href="http://www.buzzfeed.com/maxseddon/does-this-soldiers-instagram-account-prove-russia-is-covertl">used
+to locate Russian soldiers in Ukraine</a>, and it is both a powerful
+tool to discover lying governments, and a useful tool to help people
+understand the value of the private information they provide to the
+public.</p>
+
+<p>The package is not trivial to backport to Debian Stable/Jessie, as
+it depend on several python modules currently missing in Jessie (at
+least python-instagram, python-flickrapi and
+python-requests-toolbelt).</p>
+
+<p>(I have uploaded
+<a href="https://screenshots.debian.net/package/creepy">the image to
+screenshots.debian.net</a> and licensed it under the same terms as the
+Creepy program in Debian.)</p>
+</description>
+ </item>
+
<item>
<title>Always download Debian packages using Tor - the simple recipe</title>
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
</description>
</item>
- <item>
- <title>TISA - nok en problematisk og hemmelig handelsavtale</title>
- <link>http://people.skolelinux.org/pere/blog/TISA___nok_en_problematisk_og_hemmelig_handelsavtale.html</link>
- <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/TISA___nok_en_problematisk_og_hemmelig_handelsavtale.html</guid>
- <pubDate>Thu, 5 Nov 2015 09:20:00 +0100</pubDate>
- <description><p>Norge er aktiv i Trade in Services Agreement-forhandlingene, og
-regjeringen forteller at
-«<a href="https://www.regjeringen.no/no/tema/utenrikssaker/handelspolitikk/tisa/id2403335/">TISA
-vil sikre norske tjenesteeksportører forutsigbar og
-ikke-diskriminerende adgang til utenlandske tjenestemarkeder</a>».
-Det er mulig at det stemmer. Men den gjør mye mer enn det. Avtalen
-forhandles i hemmelighet, og kun takket være
-<a href="https://wikileaks.org/tisa/">Wikileaks</a> er
-utkast og biter kjent i offentligheten. Det som er blitt kjent er
-for eksempel at TISA kan
-<a href="https://www.techdirt.com/articles/20150604/06324931218/tisa-agreement-might-outlaw-governments-mandating-open-source-software-many-situations.shtml">blokkere
-myndigheter fra å kreve bruk av fri programvare i mange
-situasjoner</a>, hvilket vil fjerne muligheten vår til å ha kontroll
-over egne datasystemer i slike tilfeller. Den kan også
-<a href="https://www.eff.org/deeplinks/2015/05/tisa-yet-another-leaked-treaty-youve-never-heard-makes-secret-rules-internet">blokkere
-Norges mulighet til å holde kontroll med overføring av
-personinformasjon ut av landet</a>, hvilket Snowden-bekreftelsene har
-dokumentert er svært problematisk.
-
-<p>Jeg ble derfor veldig glad da jeg i dag ble tipset i dag om at det
-allerede finnes en aktiv organisasjon,
-<a href="http://www.folkeaksjonenmottisa.no/">Folkeaksjonen mot
-TISA</a>, som jobber for å hindre at Norge signerer på TISA-avtalen.
-Her må alle gode krefter jobbe sammen. Jeg skal sende dem litt
-penger, og se om jeg har kapasitet til å bidra med mer.</p>
-</description>
- </item>
-
</channel>
</rss>