Language Selection

English French German Italian Portuguese Spanish

Making online connections more personal

Filed under
Web

The two Chicago residents lived three blocks from each other, but they had no idea. They were on their PCs, at home, when they figured it out. Today they're dating.

Two childhood buddies, now in their mid-20s, hadn't seen each other since they were students at Wheaton Warrenville South High School. Since "running into" each other while online last month, they are rekindling a friendship.

All four individuals were using an innovative new application called Meetro, which combines instant messaging with your physical location to connect you with others who are nearby.

It's the brainchild of 27-year-old Paul Bragiel, who for the last six years has been running a video game software company called Paragon 5 (www.paragon5.com).

Along with a partner, he started developing Meetro because "we thought it would be cool to use."

The tool, which launched last month, is available as a free download at the Meetro Web site (www.meetro.com). Once opened, Meetro figures out where you are.

But it does not use global positioning technology to do so.

It uses ordinary wireless network, or Wi-Fi, signals.

"It's called triangulation," Bragiel said. "We can figure out where you are based on the Wi-Fi signals around you. You can find out within a couple-hundred-foot radius where the person is located."

Usually, more than one wireless signal is needed for the technology to work, which is typically not a problem in Chicago.

"In the city of Chicago, almost anybody who has a laptop that opens it up around a public place, or in an apartment building where a lot of people have Wi-Fi, we can pick it up," Bragiel said.

In the suburbs, where things are more spread out, users can simply enter their address "so the next time you use Meetro in your house, it will recognize your router and your location. This way, desktop [PC] users can use it as well."

Once Meetro knows where you are, it looks for other people who are using the application nearby.

"It does all the mathematical calculations and determines your general radius. Then the face pane comes up," Bragiel said. "It shows you all the people who are around you using Meetro and the pictures they put up of themselves."

From there you can click on each person's photo and read their "profile."

"It'll tell you what their favorite books are, where their blog is, and you can also view who their friends are," he said.

Bragiel said it's this last aspect, the one he calls "social networking," that further separates Meetro from anything else that's available.

"You can see how these people are connected to you," he said. "So if Janice down the street is a friend of this person's, and Janice is friends with your friend, you'll know how you're connected to this person. It's the six degrees of separation thing."

You can also exchange instant messages with any of the users who are displayed. Meetro has its own proprietary instant-messaging tool built in ("it's completely encrypted and secure") and also supports AOL and ICQ.

Within a month, support will be added for MSN and Yahoo instant messages.

"You can say, `Hey, what's up, we're really close, let's meet up.' Of course, we have security built in too. You can block anybody if they're being annoying."

To protect the safety of users, exact addresses are never available for others to see. Neither are specific distances between users.

"We only tell people relative distances, like you're within a quarter-mile or a half-mile," Bragiel said.

Further, Bragiel suggests you use the same precautions on Meetro as you would on any other online community: use extreme caution before revealing your real name (use a nickname or code name instead), your address or any other personal information.

As for photos, the security conscious can use a cartoon or even a photo of a pet.

There are about 2,000 Meetro users, with more than half in the Chicago area.

Although Meetro hasn't made any money yet, Bragiel has big plans.

He hopes to license the tool to conference organizers to help attendees meet one another. And he believes many Web sites can benefit from the kind of location-based services Meetro provides.

"It's an alternative GPS," he said.

"Imagine opening up ESPN.com and immediately being localized to the Chicago, or Japan, version of the site."

By ALEX L. GOLDFAYN
Chicago Tribune

More in Tux Machines

Security: VPNFilter, Encryption in GNU/Linux, Intel CPU Bug Affecting rr Watchpoints

  • [Crackers] infect 500,000 consumer routers all over the world with malware

    VPNFilter—as the modular, multi-stage malware has been dubbed—works on consumer-grade routers made by Linksys, MikroTik, Netgear, TP-Link, and on network-attached storage devices from QNAP, Cisco researchers said in an advisory. It’s one of the few pieces of Internet-of-things malware that can survive a reboot. Infections in at least 54 countries have been slowly building since at least 2016, and Cisco researchers have been monitoring them for several months. The attacks drastically ramped up during the past three weeks, including two major assaults on devices located in Ukraine. The spike, combined with the advanced capabilities of the malware, prompted Cisco to release Wednesday’s report before the research is completed.

  • Do Not Use sha256crypt / sha512crypt - They're Dangerous

    I'd like to demonstrate why I think using sha256crypt or sha512crypt on current GNU/Linux operating systems is dangerous, and why I think the developers of GLIBC should move to scrypt or Argon2, or at least bcrypt or PBKDF2.

  • Intel CPU Bug Affecting rr Watchpoints
    I investigated an rr bug report and discovered an annoying Intel CPU bug that affects rr replay using data watchpoints. It doesn't seem to be hit very often in practice, which is good because I don't know any way to work around it. It turns out that the bug is probably covered by an existing Intel erratum for Skylake and Kaby Lake (and probably later generations, but I'm not sure), which I even blogged about previously! However, the erratum does not mention watchpoints and the bug I've found definitely depends on data watchpoints being set. I was able to write a stand-alone testcase to characterize the bug. The issue seems to be that if a rep stos (and probably rep movs) instruction writes between 1 and 64 bytes (inclusive), and you have a read or write watchpoint in the range [64, 128) bytes from the start of the writes (i.e., not triggered by the instruction), then one spurious retired conditional branch is (usually) counted. The alignment of the writes does not matter, and it's not related to speculative execution.

In Memoriam: Robin "Roblimo" Miller, a Videographer and Free Software Champion

Videographer Robin Roblimo Miller

Robin "Roblimo" Miller was a clever, friendly, and very amicable individual who everyone I know has plenty of positive things to say about. I had the pleasure of speaking to him for several hours about anything from personal life and professional views. Miller was a very knowledgeable person whose trade as a journalist and video producer I often envied. I have seen him facing his critics in his capacity as a journalist over a decade ago when he arranged a debate about OOXML (on live radio). Miller, to me, will always be remembered as a strong-minded and investigative journalist who "did the right thing" as the cliché goes, irrespective of financial gain -- something which can sometimes be detrimental to one's longterm health. Miller sacrificed many of his later years to a cause worth fighting for. This is what we ought to remember him for. Miller was - and always will be - a FOSS hero.

May everything you fought for be fulfilled, Mr. Miller. I already miss you.

Today in Techrights

Tux Machines Privacy Statement

Summary: Today, May 25th, the European General Data Protection Regulation (GDPR) goes into full effect; we hereby make a statement on privacy AS a matter of strict principle, this site never has and never will accumulate data on visitors (e.g. access logs) for longer than 28 days. The servers are configured to permanently delete all access data after this period of time. No 'offline' copies are being made. Temporary logging is only required in case of DDOS attacks and cracking attempts -- the sole purpose of such access. Additionally, we never have and never will sell any data pertaining to anything. We never received demands for such data from authorities; even if we had, we would openly declare this (publicly, a la Canary) and decline to comply. Privacy is extremely important to us, which is why pages contain little or no cross-site channels (such as Google Analytics, 'interactive' buttons for 'social' media etc.) and won't be adding any. Google may be able to 'see' what pages people visit because of Google Translate (top left of every page), but that is not much worse than one's ISP 'seeing' the same thing. We are aware of this caveat. Shall readers have any further questions on such matters, do not hesitate to contact us.