I revised the title many times. Am I giving the impact breadth of what it could be without veering into click-bait?

Bluetooth Low Energy MESH Network, it is built into the OS without any noted country exemption. Although there be will many air gaps, that is not what I mean.

https://www.apple.com/newsroom/2024/05/apple-and-google-deliver-support-for-unwanted-tracking-alerts-in-ios-and-android/

Some questions that came to mind reading it?

  • Can China even pull it out of the OS for good measure, hack it?
  • Even with topology of some enable, others disable, others wanting security will be reading bluetooth MAC addresses of un-consenting, disabled, for tracking of others whom have enabled, even if they are not being targeted. See below screenshots from the Internet Engineering Task Force presentation.
  • Is the Bluetooth freqz and combinatory fields bio-active in any regard of it’s function? Do plants stay healthy around “high intake” Bluetooth whatever that may be?
  • They mentioned other devices and Industry being involved, how many devices to we expect to also use this protocol in the future?
  • If we mapped it out, all of these devices thus operating, mapped out of the whole network with a Supercomputer, real-time, how much energy do you think it would be? How many BLE pulses per second, in a busy metropolitan area?
  • Who pushed for this TRACKING NETWORK I will be partcipating in whether I like or NOT (uptake)?
  • Where was the pre-planning market and socio-economic research on this presented beforehand?
  • If entities very intent on tracking you, will just disable/refuse the protcol, then why instead would Apple and Alphabet whom introduced the vulnerability, just …make thier own implementation secure?

So we’re going to skip this useless marketing-speak on 9to5 Mac - Here’s how the new Cross-Platform Tracking Detection works in iOS 17.5

As far as I can tell, there is nothing that says it doesn’t perform assessment of the MAC address in range, all of them, for “your” security of course. In fact, it seems in line with what they want to accomplish: Track all the trackers? Later safeguard them with a “Safefilter” online database check when Phone starts?

Did I get it wrong?

  • ilega_dh@feddit.nl
    cake
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    The question regarding Bluetooth and plants is the giveaway this is an r/conspiracy-level post, and that you have no idea what you’re talking about lmao.

    Did I get it wrong?

    Oh boy, yes. This network tracks items specifically built on this protocol. It has nothing to do with “tracking your MAC address”. That’s already done whenever you walk into a train station and goes over WiFi. Which you can disable.

    MAC addresses are not unique. If you know the seed for it’s random generation you might be able to track it across WiFi networks that you own, but you’ll already know where the user is since you own the fucking network. This is not a worldwide tracking network that can follow your every move.

    If that’s what you’re worried about, I suggest ditching your phone completely. Because the “worldwide tracking network” that already works is called the cellular network, no need to build another one.

  • haywire@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    When it comes to WiFi Mac’s mobile phones have fudged them for “privacy” for years, if this goes main stream I see the same thing coming in for Bluetooth.

    They promise the macs are random but I don’t have much faith in that.

    Looking up a real Mac to see what manufacturer it came from is something I do almost daily sorting out network issues for customers and really is not difficult. From there it takes a leap to guess what the device is if it’s name doesn’t help but more often than not it’s easy enough to see what’s out there, the random macs of phones stick out like a sore thumb as they don’t come back as anything usually so you can then track that around the network and see what they are up to that way.

    • Elias Griffin@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Thank you for adding this, erm, maybe a bit “insider” info, as I always wondered how easy and reliable it was to map MAC to Manufacturer on mobile devices. Given what you say, the IETF tracking database could technically contain, or used as metadta, for another system to identify all device models.

      Yeah, and what is that MAC generation scheme Apple/Android uses from a Security standpoint, what conditions make it regenerate and how often? How easy is it to map a “new” random MAC against a Model again when it re-enters the network and fingerprints itself again.

      Lots to think about it.

      • thisisnotgoingwell@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        I think you need to take the thought of “network” completely out of your mind. This protocol is specifically regarding devices such as air tags, which don’t have any network capability themselves but rely on “connecting” to Bluetooth of the manufacturers models. The phones themselves are what gives tracking information back, based on GPS of the phone that was in proximity of the tracker.

        The question that Google/Apple have is, how can we make sure people aren’t unknowingly being tracked by someone putting a physical tracker in say, your car. THAT’S the “protocol” part. A protocol is just an agreement on how a technology is going to be implemented. If your own tracker is following you that’s fine, the MAC address will keep changing. If someone else’s air tag is following you, your phone will know this tracker has been near you for some time, and will tell you.

        • Elias Griffin@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          1
          ·
          edit-2
          2 months ago

          I can appreciate your re-iterating of the fundamentals of extremely easy to understand tech, but instead of basic thinking, you just repeating the already presented text which anyone can read hopefully, I presented a case for how it could be used that meets all technical specifications and is therefore possible. Likely even, given big tech track record.

          This pheneomena of using tech “not as in the manual” is common. In fact, the Apache web server team was not sure it would work and the Internet adopted a series of HTTP patches as a whole unlike they intended.

          don’t have any network capability themselves

          That is just wrong and I can’t understand how you came to that conclusion. I also invite you to think of it as a network, because it is using Bluetooth in a network?

          • thisisnotgoingwell@programming.dev
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Brother, I’m a 10+ year network engineer… Bluetooth is a low power, low speed, short range(30 feet) technology. The power of Bluetooth signals are over 1000x weaker than what cellphones use to connect to cell towers. There isn’t going to be any sophisticated “networking” happening between airtags. Your original post was almost gibberish, I had to struggle to arrive at the point you’re trying to make. You can call it a network if you want but you’re asking if it could be practical as a standalone, autonomous network and the answer is no. They lack the capability to communicate over any meaningful distance. Not much “networking” capability if it can’t talk to other networks. Others have struggled to talk sense into you so I won’t waste anymore of my time. Though I’d suggest that if you’re going to argue against logic then you should be more open to reason.