Why are you sticking with a specific spectrum? You made it hard to read in service of a requirement that doesn’t make any sense.
Why are you sticking with a specific spectrum? You made it hard to read in service of a requirement that doesn’t make any sense.
I get how it works with wifi connections, and Bluetooth scanning (since that’s a peer to peer protocol that needs to broadcast its availability), and obviously the OS-level location services, but I’m still not seeing how seeing wifi beacons would reveal anything. For one, pretty much every mobile device OS now uses MAC randomization so that your wifi activity on one network can’t be correlated with another. And for another, I think the BSSID scanning protocol is listen only for client devices.
Happy to be proven wrong, and to learn more, but the article linked doesn’t seem to explain anything on this particular supposed threat.
I set a simple task to turn off WiFi when my home network is not detected so my phone doesn’t scan and report my location to businesses.
I was under the impression that BSSID scanning was entirely passive, and that a phone that scans for beacons doesn’t actually reveal itself to anyone.
And that introduces a specific type of supply chain threat: someone who possesses a computer can infect their own computer, sell it or transfer it to the target, and then use the embedded microcode against the target, even if the target completely reformats and reinstalls a new OS from scratch.
That’s not going to affect most people, but for certain types of high value targets they now need to make sure that the hardware they buy hasn’t already been infected in the supply chain.
Racists would pay quite a bit of money to be able to target certain ethnic groups.