Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created claim: date (P100): 2019)
(‎Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.)
 
(2 intermediate revisions by the same user not shown)
Property / instance of
 +
Property / instance of: scholarly article / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Bluetooth Low Energy / rank
 +
Normal rank
Property / quote
 +
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank
 +
Normal rank

Latest revision as of 21:51, 14 May 2020

journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019
Language Label Description Also known as
English
Tracking Anonymized Bluetooth Devices
journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019

    Statements

    2019
    0 references
    By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
    0 references

    Identifiers