4 date="2013-03-13T23:00:58Z"
8 Are you referring to executables provided by the geoip-database package in Debian stable?
10 http://packages.debian.org/stable/geoip-database
12 > GeoIP is a C library that enables the user to find the country that any IP address or hostname originates from. It uses a file based database. This database simply contains IP blocks as keys, and countries as values and it should be more complete and accurate than using reverse DNS lookups.
14 I want to be sure, because packages related to Geoclue may be worrisome to users who run Tails from a laptop, due to the danger of unwittingly providing GPS information to \"location-aware apps\" as one surfs (a potentially dangerous privacy violation to which Windows users are known to be subject, although this concern may be diminished for Linux users):
16 http://packages.debian.org/stable/geoclue
18 > GeoClue provides applications access to various geographical information sources using a D-Bus API or a C library.
20 http://packages.debian.org/stable/geoclue-geonames
22 > GeoClue provides applications access to various geographical information sources using a D-Bus API or a C library. This package provides a geocoder backend for GeoClue. The location information comes from www.geonames.org.
24 http://packages.debian.org/stable/geoclue-gpsd
26 > GeoClue provides applications access to various geographical information sources using a D-Bus API or a C library. This package provides a positioning backend for GeoClue. The location information comes from a GPS receiver through gpsd.
28 As I recall, it is public knowledge that this or a similar utility (installed by the owner of a laptop, as part of a standard installation) has already been hijacked by \"the authorities\" in order to arrest at least one political dissident (an Occupy activist), in a highly publicized case which occurred recently in the USA.
30 As I recall, it is also known (for example, from papers in the freenode archive) that under certain circumstances, dbus vulnerabilities can be abused by our adversaries. This could be particularly relevant for users who boot Tails from a USB stick.
32 One recalls that Google, which has just been fined 7 million dollars for illegally snagging
34 * the name and MAC address of all WiFi routers encountered by StreetView vehicles
35 * information about any encryption used
36 * MAC addresses of attached peripherals
37 * email content snagged in passing from unencrypted routers
39 One recalls further that a Google patent application laid out pretty clearly Google's interest in collecting such data: it wants to identify by MAC address to map by geolocation all the home and office electronic equipment in the world, to within one metre accuracy, in three dimensions. Pretty amazing, but the patent application is quite clear, and it is easy to see what kinds of organizations Google planned to sell this data. (Alas, other organizations are hard at work on similar projects, mostly with less secrecy than has been adopted by Google.)
41 I can dig up some links if anyone is interested.