<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 21:49:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Linux Action News - Episodes Tagged with “Location Data”</title>
    <link>https://linuxactionnews.com/tags/location%20data</link>
    <pubDate>Sun, 26 Nov 2017 09:00:00 -0800</pubDate>
    <description>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Our weekly take on the free and open source world.</itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Linux Action News 29</title>
  <link>https://linuxactionnews.com/29</link>
  <guid isPermaLink="false">6fe14aa3-bf55-4c62-8197-6eed26225cb1</guid>
  <pubDate>Sun, 26 Nov 2017 09:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/dec90738-e640-45e5-b375-4573052f4bf4/6fe14aa3-bf55-4c62-8197-6eed26225cb1.mp3" length="17479291" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Android tracking more invasive than previously known, Ubuntu wants your ideas for Mir, Linus gets heated about Kernel security and we focus on the technical issue at the heart of the matter.</itunes:subtitle>
  <itunes:duration>23:57</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
  <description>Android tracking more invasive than previously known, Ubuntu wants your ideas for Mir, and Linus gets heated about Kernel security while we focus on the technical issue at the heart of the matter.
Plus a new magazine from the Raspberry Pi Foundation, several vulnerabilities in Intel's Management Engine, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Android tracking more invasive than previously known, Ubuntu wants your ideas for Mir, and Linus gets heated about Kernel security while we focus on the technical issue at the heart of the matter.</p>

<p>Plus a new magazine from the Raspberry Pi Foundation, several vulnerabilities in Intel&#39;s Management Engine, and more!</p><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Google collected location data from Android users who didn&#39;t know" rel="nofollow" href="http://pocketnow.com/2017/11/22/google-collected-location-information-unaware-android-users">Google collected location data from Android users who didn't know</a> &mdash; In a nutshell, the whereabouts of every active Android phone and tablet in the world were tracked even with location services disabled and no carrier SIM card inserted.</li><li><a title="Ubuntu want community input on Mir" rel="nofollow" href="https://community.ubuntu.com/t/mirs-next-steps-we-need-your-input/2140">Ubuntu want community input on Mir</a> &mdash; However we’re also at the place where we need to reach out to the community and ask what are the aspects of your desktop that you value most, to help us figure out a direction for Mir.</li><li><a title="New magazine from the Raspberry Pi Foundation - Hackspace" rel="nofollow" href="https://hackspace.raspberrypi.org/issues/1">New magazine from the Raspberry Pi Foundation - Hackspace</a> &mdash; The first issue of HackSpace magazine is here! Join us as we explore thinking machines, build a trebuchet, learn how Arduino changed the world, see how far we can overclock a Raspberry Pi using liquid nitrogen, and much more…</li><li><a title="Linus gets heated about kernel security" rel="nofollow" href="https://www.theregister.co.uk/2017/11/20/security_people_are_morons_says_linus_torvalds/">Linus gets heated about kernel security</a> &mdash; Linux Lord fires up over proposal to secure Linux by shutting down wonky processes</li><li><a title="Then calmly explains his position" rel="nofollow" href="https://www.theregister.co.uk/2017/11/24/linus_torvalds_approach_to_security/">Then calmly explains his position</a> &mdash; His long post on the matter suggested to security practitioners that “'Do no harm' should be your mantra for any new hardening work.”</li><li><a title="Others act like children" rel="nofollow" href="https://twitter.com/grsecurity/status/933469938312007680?ref_src=twsrc%5Etfw&amp;ref_url=https%3A%2F%2Fwww.reddit.com%2Fr%2Flinux%2Fcomments%2F7ez9zc%2Fapparently_linux_security_people_kees_cook_brad%2F">Others act like children</a> &mdash; So on the day of Kees' presentation, where he tried to drop a useless 0day on me and talk up how many upstream developers reviewed his code that did the same limitation *right*, I wrote an exploit of my own.</li><li><a title="Vulnerability in Intel Management Engine" rel="nofollow" href="https://arstechnica.com/information-technology/2017/11/intel-warns-of-widespread-vulnerability-in-pc-server-device-firmware/">Vulnerability in Intel Management Engine</a> &mdash; Remote attackers could launch commands on a host of Intel-based computers, including laptops and desktops shipped with Intel Core processors since 2015. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Android tracking more invasive than previously known, Ubuntu wants your ideas for Mir, and Linus gets heated about Kernel security while we focus on the technical issue at the heart of the matter.</p>

<p>Plus a new magazine from the Raspberry Pi Foundation, several vulnerabilities in Intel&#39;s Management Engine, and more!</p><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Google collected location data from Android users who didn&#39;t know" rel="nofollow" href="http://pocketnow.com/2017/11/22/google-collected-location-information-unaware-android-users">Google collected location data from Android users who didn't know</a> &mdash; In a nutshell, the whereabouts of every active Android phone and tablet in the world were tracked even with location services disabled and no carrier SIM card inserted.</li><li><a title="Ubuntu want community input on Mir" rel="nofollow" href="https://community.ubuntu.com/t/mirs-next-steps-we-need-your-input/2140">Ubuntu want community input on Mir</a> &mdash; However we’re also at the place where we need to reach out to the community and ask what are the aspects of your desktop that you value most, to help us figure out a direction for Mir.</li><li><a title="New magazine from the Raspberry Pi Foundation - Hackspace" rel="nofollow" href="https://hackspace.raspberrypi.org/issues/1">New magazine from the Raspberry Pi Foundation - Hackspace</a> &mdash; The first issue of HackSpace magazine is here! Join us as we explore thinking machines, build a trebuchet, learn how Arduino changed the world, see how far we can overclock a Raspberry Pi using liquid nitrogen, and much more…</li><li><a title="Linus gets heated about kernel security" rel="nofollow" href="https://www.theregister.co.uk/2017/11/20/security_people_are_morons_says_linus_torvalds/">Linus gets heated about kernel security</a> &mdash; Linux Lord fires up over proposal to secure Linux by shutting down wonky processes</li><li><a title="Then calmly explains his position" rel="nofollow" href="https://www.theregister.co.uk/2017/11/24/linus_torvalds_approach_to_security/">Then calmly explains his position</a> &mdash; His long post on the matter suggested to security practitioners that “'Do no harm' should be your mantra for any new hardening work.”</li><li><a title="Others act like children" rel="nofollow" href="https://twitter.com/grsecurity/status/933469938312007680?ref_src=twsrc%5Etfw&amp;ref_url=https%3A%2F%2Fwww.reddit.com%2Fr%2Flinux%2Fcomments%2F7ez9zc%2Fapparently_linux_security_people_kees_cook_brad%2F">Others act like children</a> &mdash; So on the day of Kees' presentation, where he tried to drop a useless 0day on me and talk up how many upstream developers reviewed his code that did the same limitation *right*, I wrote an exploit of my own.</li><li><a title="Vulnerability in Intel Management Engine" rel="nofollow" href="https://arstechnica.com/information-technology/2017/11/intel-warns-of-widespread-vulnerability-in-pc-server-device-firmware/">Vulnerability in Intel Management Engine</a> &mdash; Remote attackers could launch commands on a host of Intel-based computers, including laptops and desktops shipped with Intel Core processors since 2015. </li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
