When it comes to IP Geolocation, it's possible to find where the ISP is operating. It's much harder to find out the location of a particular client of an ISP, though I think it's much easier to do that with a wireless connection (the whole Tower Triangulation thing and whatnot). However, it's a very good way to guess about where a certain client might live by figuring out where the closest ISP servers are. Tools like
TOR (I use this whenever I feel the need to have location privacy that's difficult for man-in-the-middle attacks by Mallory) are helpful for hiding one's actual location.
People here know that I'm a bit of a mixed bag when it comes to information privacy. However, I follow the rule that I only reveal information that I want to reveal and I always make the assumption that that information -- even when entrusted to a group of people, like this guild (I probably said so much about me here) -- will most likely leak out somehow. I'm also a user of OpenID, and also a light supporter of it, but I take advantage of the multiple profiles so I can choose what personal information OpenID sites look up.
When it comes to data and information I don't ever want people to know, I'd like to think it'll take essentially a rubber hose attack to get me to reveal anything. I keep my passwords in a database locked by something I physically have and something I know, my ultraportables and external hard disks have enciphered areas also requiring something I physically have and something I know, very important things (I do this sometimes for important digital documents I receive that I want to keep) are enciphered and signed by me to ensure that it can't be read and can't be tampered easily, and I have some other procedures. Even though it all sounds secure, there's one gigantic weak point in it. That can be fixed in the future, though.
.
.
.
Erm... that aside... a good way of making passwords that I need to remember (that I don't want to use the database for) is to choose five or six words out of a hat and change the letters of some of them. Here's an example:
Mountain Slots Sanitorium Utility Poncho
M0un7&1n Sl07s S&n170r1um U71l17y P0nch0
The bottom one, with the changes, would be considered a strong password. Some things one can do, then, is simply rearrange or remove words depending on severity of the situation. It's a good system that only requres you to remember which words you used and the rules you used. However, it's sometimes hard to remember which and what.