Skip to main content

This Fitness Tracking App Revealed Secret US Military Bases Around The World


We all know very well that the Strava is an app/platform very popular among sports people (especially running, mountain biking, cycling and swimming). However, now recently, a fitness tracking app has revealed all the secret US Military bases around the world.

This Fitness Tracking App Revealed Secret US Military Bases Around The World

The Strava is an app/platform very popular with sports people (especially running, mountain biking, cycling and swimming). Since the app does the mapping wherever we walk, we can easily have detailed information on the route and also the activity.

Data loaded by soldiers on the Strava platform in November 2017 uncovered secret US military bases in the Middle East.

The news was advanced by The Guardian and reveals that the soldiers shared sensitive information certainly without realizing it. According to the publication, there is a shared map in 2017 that shows the United States’ secret military bases in the Middle East, making them easily identifiable and evident on a dark map.

In addition to the bases, one can easily perceive the movements of the soldiers.
Speaking to the newspaper, Nathan Ruser, the Australian student who discovered this “flaw” noted that “US military bases are clearly identified and mapped. If soldiers use the application as normal people, turning it on when they are going to exercise, this can be especially dangerous”.

Nathan Ruser also warned on Twitter for the security breach:-


By zooming the map, you can see the layout of the base. Curiously the base itself is not visible via satellite, on services like Google Maps or Apple Maps, but can be clearly identified through Strava.



Besides location, using the heat maps produced by Strava is possible to realize the level of activity (movements) in a given area.

Analyst Scott Lafoy told CNN that “In strategic terms, we all know the basics, we all know many of the positions, and this is just supplementary information,” however “if the data is not anonymous, it is possible to be able to perceive times and other information very tactical and then we enter very serious territory.

The Pentagon is already reviewing the situation it considers critical. Those responsible for the platform have also issued a statement saying they are willing to help users to give them control over what they share.

Moreover, the map in question can be seen here.

So, what do you think about this? SImply share all your views and thoughts in the comment section below.

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…