I appreciate the conscientious attention to security concerns.
I am not an application developer, but instead a habitual customizer of my own workspace. As such, I use tools that I can adapt to readily without having to learn how to be a full-stack engineer.
I use a utility which allows me to write javascript modules that run (under node.js) either cli scripts that I write or utilities the system provides, in order to provide me details about my system that I find useful, such as the name of my current wi-fi network and the signal-to-noise ratio of the connection.
These details are presented on my desktop specifically so that they are available without requiring interaction that may interrupt my workflow.
What I'd like, and I think I am not alone in this, is for there to be significant granularity in the application of security mechanisms so that power users can access the full features of the general computing environment without having to run the extra marathon of becoming application developers.
Sure, protect location information from specious tools. Maybe provide some sort of sandbox for administrator-level users to run scripts that execute commands without jumping through hoops, so long as it is all being done locally.
The assumption should be that if I have access to the physical machine, and I have administrator-level privileges on it, then I should able to anything at all that I want on that machine, period. But, anyone remotely connecting into that machine to do anything at all should have all the hoops to jump through.
Yes, automated data portability and reliable security are problematically opposed concerns. If I have access to my data through a remote connection, then anyone having physical access to my hardware may have the same access unless we can lock down either the hardware itself, or the access provided, so there are going to be hoops somewhere. But what seems to get lost in the conversation is the fact that the signal/noise ratio of my wifi connection from moment to moment *may* be able to provide someone with extremely sophisticated equipment and serious motivation a clue as to my physical location, but the statistical likelihood of that specific data being a real threat is close to nil, so it should not be buried behind the same kind of security as the hardware MAC address of my wifi device.