{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihhmasjau24evc4zwicxkgfxmunk4nzm5tid2u7w5ld3t5dgfse6i",
"uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mganprcprhf2"
},
"path": "/t/open-source-location-spoofing-as-a-privacy-security-measure/35946#post_6",
"publishedAt": "2026-03-04T14:35:23.000Z",
"site": "https://discuss.privacyguides.net",
"textContent": "OK, I always find discussions on Location Spoofing to lack the details needed to discuss anything meaningful. So let’s define some stuff\n\n**Location spoofing:** falsifying your location on a software tool that requests your location. This is usually achieved by feeding false data into a location service\n\n**Location services** : one of many different techniques used to pair a device with a coordinate. ‘Location spoofing’ is really a compilation of different techniques for fooling each different location service\n\nCommon location services:\n\n * **GNSS** : traditional satellite-based location. Requires a dedicated GNSS L-band chip, a LOS with the sky & a local constellation map\n * **WiFi Positioning** : compares the list of visible WiFi access points to a known database of SSIDs & MAC addresses to estimate location. Requires an active 802.11 chip. Increasingly used to augment GNSS on cell phones\n * **Cellular Positioning** : carrier-based triangulation, positions cell users within a few meters by their signal strength measured from all detectable cell towers. Requires cellular network antennas, i.e. GSM/CDMA/LTE/5G/etc. Often used by emergency services & governments\n * **BLE Mesh Networks** : a large mesh network uses Bluetooth signals to detect a device & share its location to a central server with a secondary location service. Requires a BLE chip. Used by Apple FindMy network, Tile, and whatever Samsung’s tracking service is called\n * **IP Geolocation** : similar to WiFi Positioning, but instead compares your device’s IP address against known databases to estimate location\n\n\n\nSo, depending on your hardware, software, goals, and threat model, ‘location spoofing’ can define completely different techniques. Let’s get specific - what are we trying to spoof?",
"title": "Open source location spoofing as a privacy/security measure?"
}