移动运营商可以获取你的GPS位置。
Mobile carriers can get your GPS location

原始链接: https://an.dywa.ng/carrier-gnss.html

## 苹果的新隐私功能与蜂窝网络位置追踪 苹果的iOS 26.3推出了一项隐私功能,限制了与蜂窝网络共享的“精确位置”数据,但仅限于配备苹果2025年调制解调器的设备。虽然蜂窝塔三角定位的精度有限(数十米到数百米),但蜂窝标准秘密利用设备中的GNSS数据(GPS等)进行精确的位置追踪——精确到个位数米。 RRLP/LPP等协议允许网络*请求*并接收这些精确的GNSS数据,在后台无缝运行。这项能力并非新技术;诸如美国缉毒局和以色列辛贝特等机构已经利用它多年,甚至用于大规模监控,例如COVID-19接触者追踪。 作者指出潜在的漏洞,质疑这些协议是否可能被恶意行为者或外国政府利用。苹果的举措是一个积极的步骤,但他们提倡进一步的用户控制——允许禁用与运营商共享GNSS数据,并在发生此类请求时提供通知。这凸显了超出大多数用户认知范围的隐藏位置追踪层面。

相关文章

原文

In iOS 26.3, Apple introduced a new privacy feature which limits “precise location” data made available to cellular networks via cell towers. The feature is only available to devices with Apple’s in-house modem introduced in 2025. The announcement says

Cellular networks can determine your location based on which cell towers your device connects to.

This is well-known. I have served on a jury where the prosecution obtained location data from cell towers. Since cell towers are sparse (especially before 5G), the accuracy is in the range of tens to hundreds of metres.

But this is not the whole truth, because cellular standards have built-in protocols that make your device silently send GNSS (i.e. GPS, GLONASS, Galileo, BeiDou) location to the carrier. This would have the same precision as what you see in your Map apps, in single-digit metres.

In 2G and 3G this is called Radio Resources LCS Protocol (RRLP)

So the network simply asks “tell me your GPS coordinates if you know them” and the phone will respond.

In 4G and 5G this is called LTE Positioning Protocol (LPP)

RRLP, RRC, and LPP are natively control-plane positioning protocols. This means that they are transported in the inner workings of cellular networks and are practically invisible to end users.

It’s worth noting that GNSS location is never meant to leave your device. GNSS coordinates are calculated entirely passively, your device doesn’t need to send a single bit of information. Using GNSS is like finding out where you are by reading a road sign: you don’t have to tell anyone else you read a road sign, anyone can read a road sign, and the people who put up road signs don’t know who read which road sign when.

These capabilities are not secrets but somehow they have mostly slid under the radar of the public consciousness. They have been used in the wild for a long time, such as by the DEA in the US in 2006:

[T]he DEA agents procured a court order (but not a search warrant) to obtain GPS coordinates from the courier’s phone via a ping, or signal requesting those coordinates, sent by the phone company to the phone.

And by Shin Bet in Israel, which tracks everyone everywhere all the time:

The GSS Tool was based on centralized cellular tracking operated by Israel’s General Security Services (GSS). The technology was based on a framework that tracks all the cellular phones running in Israel through the cellular companies’ data centers. According to news sources, it routinely collects information from cellular companies and identifies the location of all phones through cellular antenna triangulation and GPS data.

Notably, the Israeli government started using the data for contact tracing in March 2020, only a few weeks after the first Israeli COVID-19 case. An individual would be sent an SMS message informing them of close contact with a COVID patient and required to quarantine. This is good evidence that the location data Israeli carriers are collecting are far more precise than what cell towers alone can achieve.

A major caveat is that I don’t know if RRLP and LPP are the exact techniques, and the only techniques, used by DEA, Shin Bet, and possibly others to collect GNSS data; there could be other protocols or backdoors we’re not privy to.

Another unknown is whether these protocols can be exploited remotely by a foreign carrier. Saudi Arabia has abused SS7 to spy on people in the US, but as far as I know this only locates a device to the coverage area of a Mobile Switching Center, which is less precise than cell tower data. Nonetheless, given the abysmal culture, competency, and integrity in the telecom industry, I would not be shocked if it’s possible for a state actor to obtain the precise GNSS coordinates of anyone on earth using a phone number/IMEI.

Apple made a good step in iOS 26.3 to limit at least one vector of mass surveillance, enabled by having full control of the modem silicon and firmware. They must now allow users to disable GNSS location responses to mobile carriers, and notify the user when such attempts are made to their device.


联系我们 contact @ memedata.com