{"entities":{"Q4554":{"pageid":27672,"ns":120,"title":"Item:Q4554","lastrevid":86910,"modified":"2020-05-14T21:51:12Z","type":"item","id":"Q4554","labels":{"en":{"language":"en","value":"Tracking Anonymized Bluetooth Devices"}},"descriptions":{"en":{"language":"en","value":"journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019"}},"aliases":{},"claims":{"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://content.sciendo.com/view/journals/popets/2019/3/article-p50.xml","type":"string"},"datatype":"url"},"type":"statement","id":"Q4554$816E0EF9-DDE2-4020-B632-F56355BE68FF","rank":"normal"}],"P62":[{"mainsnak":{"snaktype":"value","property":"P62","datavalue":{"value":"10.2478/popets-2019-0036","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q4554$3e3912e8-4d04-503b-57a2-f6450c4898d4","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2019-00-00T00:00:00Z","timezone":0,"before":0,"after":0,"precision":9,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4554$de74079b-4767-6cb7-c5a3-410668672e4a","rank":"normal"}],"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":210,"id":"Q210"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4554$0d18d7bf-4256-9ce5-170f-92651bd268b0","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4406,"id":"Q4406"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4554$9476e0d7-47bb-395b-850d-7fb3b65f4285","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4554$960aed26-4c68-d6f1-33b7-db1c7be05eb7","rank":"normal"}]},"sitelinks":{}}}}