Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.)
 
(One intermediate revision by the same user not shown)
Property / concerns
 +
Property / concerns: Bluetooth Low Energy / rank
 +
Normal rank
Property / quote
 +
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank
 +
Normal rank

Latest revision as of 21:51, 14 May 2020

Statements

2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references

Identifiers