@@ -16,7 +16,7 @@ Advanced Privacy lets you manage in app trackers, IP address and location. It’
### What are we talking about ?
A typical tracker consists of a software initiating requests from the device to send personal data to specific endpoints, or APIs which collect connections' metadata while providing a service. The collection and aggregation of these data are used to track users' activity and behavior.
A typical tracker consists of a software initiating requests from the device to send personal data to specific endpoints or APIs which collect connections' metadata while providing a service. The collection and aggregation of these data are used to track users' activity and behavior.
Tracing a tracker means having a look at which applications (or system components) are connecting to which endpoints (when, how much data, which data, ...).
@@ -46,7 +46,7 @@ IP (Internet Protocol) addresses are the origin and destination addresses of the
A smartphone device is practically never directly connected to internet, with "its" IP address. Its visible IP address on internet is the one actually attributed by the cellular provider, the one of the home internet connection, or the one of the current Wi-Fi hotspot. In each of these situations, the same IP address may be used by many users at a same time (using the Network Address Translation protocol - NAT) and many IP addresses may be used the same day by one device just because the user has moved.
IP addresses are the way to link the internet activity to an individual in the real world, for including for legal purposes. For example, leaving a comment on a forum:
IP addresses are the way to link the internet activity to an individual in the real world, including for legal purposes. For example, leaving a comment on a forum:
* The forum's hosting service has to store the IP address of who has posted the comment (for a legal period of time)
* The Internet Service Provider (ISP) has to store the IP address (also IMEI, cell ID) and to which customer it is linked (for a legal period of time)
@@ -64,7 +64,7 @@ IP addresses generally are very volatile in mobile use. In other situations, the
* Restricting contents delivery based on Geographic information,
* Banning user for game server, or from Wikipedia, for instance, after vandalization,
Internet users use IP scrambling for years to bypass those strategies.
Internet users have been using IP scrambling for years to bypass those strategies.