WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

357
[–] 4 pts

Gotta lay the groundwork so the cheating doesn't look as obvious.

[–] 2 pts

embed

Probably just following their Twitter accounts.

[–] 3 pts

Yeah the note is wrong, they're not matching peoples addresses, for those you would need a warrant. Each of the devices have unique hardware ID elements they are simply matching. t. CompSci guy

[–] 1 pt

What can be used to track devices like that?

[–] 2 pts (edited )

You could do it entirely from the local towers (triangulation represented as a regional dataset on a map) but police depts etc also have gear like stingray cell site simulators to just directly snatch the data out of the air locally at an event. Lots of different hardware companies making similar.

https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers

https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/

They tend to run em at major events, airports, etc. It's legal in the same way a flipper zero is. Like it's a crime to steal someone's car, but not intercept and clone the data of their wireless entry etc.

[–] 1 pt

I've never seen such authentic Astroturf in all my years, and I was around when it was first invented.

[–] 1 pt

That 42 billion missing infrastructure money went somewhere.

[–] 1 pt

In jewK, counter-protester antifa dropped their unlocked phone which proved that these small groups of people were in fact paid coordinated protests.

"You can't see without a warrant." "Unreliable." Fuck off. We can tell. We know it's true.