An attacker only needs one part of the information provided to a UBI company to discover a driver’s whereabouts, home, work, or who they met with, report researchers.
An attacker only needs one part of the information provided to a UBI company to discover a driver’s whereabouts, home, work, or who they met with, report researchers.