Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created a new Item: #quickstatements; #temporary_batch_1588626918625)
 
(‎Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.)
 
(4 intermediate revisions by the same user not shown)
Property / DOI
 +
Property / DOI: 10.2478/popets-2019-0036 / rank
 +
Normal rank
Property / date
 +
2019
Timestamp+2019-00-00T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 year
Before0
After0
Property / date: 2019 / rank
 +
Normal rank
Property / instance of
 +
Property / instance of: scholarly article / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Bluetooth Low Energy / rank
 +
Normal rank
Property / quote
 +
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank
 +
Normal rank

Latest revision as of 21:51, 14 May 2020

Statements

2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references

Identifiers