Social Discovery or Cyber Stalking?

AndrewSmither

Some of you may read this and wonder what Social Discovery is; if you work with youth or are a parent you need to know.  Social Discovery is a new brand of apps (from phones to tablets to PCs) that are increasing in popularity; especially among youth and young adults.  Perhaps if I threw a name like Foursquare out there, some of you might go, “oh, that.”  To name a few, Foursquare, Who’s Here, Highlight, and even Facebook’s “check in” feature fall under this new genre of apps.

What is social discovery?  It’s a service that you sign up for and then you ‘check in’ where ever you are.  After you check in people can see that you are there.  For an example let’s use “John Smith” and “Jane Doe” at a local cafe.  John Smith walks into the local cafe and orders his favorite coffee.  While he waits he logs into a Social Discovery App and checks in.  He can even have it post to his Facebook account if he wants.  He gets his coffee and sits down.  Jane Doe walks in and orders a wrap and a smoothie.  While she waits she uses the same Social Discovery App John Doe used and checks in.  John Doe has his settings on public so Jane can see that John is here.  Jane now has an opportunity to approach John based on the fact they are both using the same app service – which is used to discover new people at the places you frequent.  Still with me?

So the purpose of these apps are two fold – one, publicly let others who use the same app (Foursquare, Who’s Here, Highlight, etc) have the possibility of discovering you by being at the same place at the same time using the same app.  Two, it allows friends to follow where you have been and get your feedback on how you liked the place; you can even take pictures and leave comments and tips about the establishment.  Facebook’s new timeline check in feature even displays a map to all of those who have access to your page to see exactly where you have been, how many times, and any photos connected with that check in.  This is where I see the danger.

If people can publicly access information on where you are and when, and even see habits out of that public information – it presents itself on the borderline of stalker.  If you’re on Facebook a lot I’m sure one of you’re ‘friends’ has become a ‘Facebook Stalker.’  Have someone who comments on everything you do, or likes all your activity? yea… that’s a Facebook Stalker.  But the danger with ‘discovering’ new people and literally broadcasting your exact location to anyone presents a whole can of worms that no one is really considering.  Meeting new people is cool, and you could even set up your own ‘blind date’ by using these apps.  But what about things like human trafficking?  Okay, an extreme, yes, but a big issue even in a modern country like the USA.  I could easily see predators using these apps to get at those who allow themselves to be more vulnerable.

With all that said, where do you stand?  Do you use one of these apps, do you see the dangers, or do you feel they are completely safe?  Feel free to comment below as I see this becoming a hot topic within the next year if it isn’t already.

Source SXSW

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers