Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"
Jump to navigation
Jump to search
(Created claim: date (P100): 2019) |
(Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.) |
||
(2 intermediate revisions by the same user not shown) | |||
Property / instance of | |||
+ | |||
Property / instance of: scholarly article / rank | |||
+ | Normal rank | ||
Property / concerns | |||
+ | |||
Property / concerns: Bluetooth Low Energy / rank | |||
+ | Normal rank | ||
Property / quote | |||
+ | By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. | ||
Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank | |||
+ | Normal rank |
Latest revision as of 21:51, 14 May 2020
journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019
Language | Label | Description | Also known as |
---|---|---|---|
English |
Tracking Anonymized Bluetooth Devices
|
journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019
|
Statements
2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references