Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"
Jump to navigation
Jump to search
(Created claim: concerns (P110): Bluetooth Low Energy (Q4406)) |
(Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.) |
||
Property / quote | |||
+ | By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. | ||
Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank | |||
+ | Normal rank |
Latest revision as of 21:51, 14 May 2020
journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019
Language | Label | Description | Also known as |
---|---|---|---|
English |
Tracking Anonymized Bluetooth Devices
|
journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2019
|
Statements
2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references