Fitness App Publicizes Locations of Presidents & World Leaders

Fitness App Publicizes Locations of Presidents & World Leaders

Author: The most important weekly tech news + solutions. December 5, 2024 Duration: 3:38

Last month, a recent investigation by French newspaper Le Monde uncovered significant privacy risks involving high-ranking government officials' location through their use of the fitness tracking application Strava.

The investigation revealed that the movements of multiple world leaders—including U.S. President Joe Biden and President Donald Trump—can be tracked through their security personnel's use of the popular fitness platform via location data displayed on public profiles within the app.

Strava, which has 120 million users worldwide, allows individuals to record and share their exercise activities, including running and cycling routes. The investigation identified a staggering 26 U.S. Secret Service agents, 12 members of French President Emmanuel Macron's security team (GSPR), and 6 members of Russian President Vladimir Putin's Federal Protection Service (FSO) maintaining public profiles on the platform.

Cybersecurity Implications

The investigation exposed multiple ways that Strava's public profile system could compromise high-level security operations. Through the platform's activity feed and route mapping features, users can access detailed GPS coordinates and timestamps of any public profile's recorded activities. This enabled investigators to identify precise locations of security personnel during protection assignments, including a U.S. Secret Service agent's running route that revealed President Biden's location prior to his diplomatic summit with Chinese President Xi Jinping in San Francisco in 2023.

This also allowed investigators to reconstruct protection patterns during sensitive periods, including the weeks following recent assassination attempts on President Trump.

We also want to highlight Strava's "FlyBy" feature, which allows users to see other athletes who were active in the same area during a specific time window. This functionality effectively creates a secondary verification method for confirming security personnel locations, as multiple agents' activities often cluster around protected individuals.

Official Responses

The U.S. Secret Service has issued a statement indicating that while agents are prohibited from using personal electronic devices during protective assignments, they are permitted to use social media while off-duty.

French President Macron's office responded by issuing a directive to security personnel to cease using the application, though they maintain that the security implications were minimal. They emphasized that local authorities are always aware of presidential movements and that secure locations are thoroughly vetted.

Shady Strava

This is not the first time Strava has raised security concerns. The Pentagon previously identified risks associated with military personnel using the app, citing concerns about the exposure of classified installation locations through user activity data.

Perhaps more disturbing is the fact that security experts have emphasized that the vulnerability in Strava extends beyond immediate location tracking, as the accumulated data could be used for pattern analysis and future targeting of high profile public figures.

In other words, apps like Strava are designed to track you, as you are the product. It is also a classic example of surveillance as a service that has become commonplace in mainstream apps.

If you want to avoid having every move you make be documented by invasive Big Tech apps, we recommend a degoogled smartphone with an open source OS like GrapheneOS and Above Phone. These innovative tools will make sure that you won’t be publicly displaying your location for data brokers and cyber criminals to easily prey on.

Even more specifically, if you are looking for a fitness app that genuinely respects your privacy we recommend the open source alternative OpenTracks, which will allow you to track your sport and outdoor activities with peace of mind.

Archived Sources

Pentagon restricts use of fitness trackers, other devices

https://archive.ph/1mfot

Xi Jinping Arrives in San Francisco for China-U.S. Summit Meeting and the 30th APEC Economic Leaders' Meeting

https://archive.is/CQwRf#selection-309.0-309.109

Fitness app Strava gives away location of Biden, Trump and other leaders, French newspaper says

https://archive.is/Xopbm

Strava-using Secret Service agents inadvertently tipoff fitness app users to movements of Trump, Biden and Harris

https://archive.is/X2bFl

Strava Labs FlyByhttps://labs.strava.com/flyby/viewer/

Rise Above, with Above Phone

https://abovephone.com/



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit tbot.substack.com/subscribe

Hakeem Anwar hosts The #TBOT Show, a weekly podcast dedicated to cutting through the noise of the tech world. Instead of just reporting headlines, this show focuses on the technology news that actually shapes your daily routine, privacy, and digital freedom, explaining why it matters in clear terms. Each episode is designed to be concise and actionable, wrapping up in under twenty minutes. You’ll hear informed analysis and straightforward recommendations on how to navigate the week’s developments. True to its mission, every installment also provides a practical takeaway: this might be a powerful open-source tool you can use, a privacy-enhancing skill to learn, or a sustainable tech solution to implement. It’s a blend of necessary context and usable insight, making it a resource for anyone who wants to understand and take back control of their tech life. Tune in for a focused, efficient update that prioritizes depth over duration, ensuring you stay informed without being overwhelmed. This podcast delivers exactly what its author promises: the most important weekly tech news paired with tangible solutions.
Author: Language: English Episodes: 80

The #TBOT Show with Hakeem Anwar
Podcast Episodes
How Hackers Exploit Big Tech Phones [not-audio_url] [/not-audio_url]

Duration: 3:57
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.Thos…
Live Demo: Using OsmAnd Offline [not-audio_url] [/not-audio_url]

Duration: 10:53
Showcasing advanced offline navigation features of the open source maps app OsmAnd, such as navigation simulation. It’s an easy choice when looking to replace invasive spyware apps like Google Maps. Sign up FREE to watch…
iPhone's Secret Google Maps Database [not-audio_url] [/not-audio_url]

Duration: 2:37
If you have ever used an iPhone, you were placed in a secret Google Maps database called Sensorvault. This was so secret that not even Congress knew about it until it was up and running!Sign up FREE to watch more webinar…
How Big Tech Uses WiFi Based Surveillance [not-audio_url] [/not-audio_url]

Duration: 4:16
In this clip from our Open Source Navigation webinar, Above CEO Hakeem Anwar speaks to how megacorps like Google and Apple have been collecting all the WiFi access points in the world for surveillance purposes in the pas…
How Above Phone Protects You from Google Satellites [not-audio_url] [/not-audio_url]

Duration: 1:53
In our Open Source Navigation webinar, Above CEO Hakeem Anwar explains that when you use a normal SUPL service on a big tech phone you're sending over a lot of information, like unique identifiers, to Google. Above Phone…
How Maps Were Used in Ancient History [not-audio_url] [/not-audio_url]

Duration: 3:41
In our Open Source Navigation Webinar we discussed what the origin of prehistoric maps were in the ancient world. Long before OsmAnd and Google Maps, our ancestors used to chisel out detailed maps in mammoth tusks to kee…
Breaking Out of Tech Addiction [not-audio_url] [/not-audio_url]

Duration: 4:08
This Holiday season, you may witness some strange screen staring behavior from your friends and family.Did you know the average teen spends over 7 hours daily staring at screens? That's not including essential school wor…
Hidden Signs Your Phone is Compromised [not-audio_url] [/not-audio_url]

Duration: 1:15
The countdown is on! Our FREE Hidden Signs Your Phone is Compromised Webinar premieres on November 19th at 2 PM CST.Don't miss out on:* How law enforcement breaks into locked phones (yes, even with a passcode)* Real-time…
We Are Technology: Part 2 [not-audio_url] [/not-audio_url]

Duration: 8:08
In part two of my People's Reset presentation "We Are Technology", I'm getting into a controversial topic. I discuss how sex may deplete the life force energy and vitality in men, using the theories of Swami Vivekanada w…
We Are Technology: Part 1 [not-audio_url] [/not-audio_url]

Duration: 9:13
At the People’s Reset this year I gave a presentation "We Are Technology" an alternative theory and approach to the technology of our body. I discussed the three types of breathing in Kriya yoga and the physical, energet…