Hacker News
- Leakage paths for the Apple / Google Bluetooth tracing system https://abe-winter.github.io/2020/04/10/leaky.html 119 comments
Linked pages
- http://pando.com/2014/03/25/newly-unsealed-documents-show-steve-jobs-brutally-callous-response-after-getting-a-google-employee-fired/ 452 comments
- Moxie Marlinspike on Twitter: "First look at Apple/Google contact tracing framework: 1) Once a day, your device derives a new key ("daily tracing key"). 2) It uses that to derive a new "proximity ID" every time your device's bluetooth address changes (15min), which is broadcast to nearby BT sensors. 1/10" / Twitter https://twitter.com/moxie/status/1248707315626201088 109 comments
- MAC randomization: A massive failure that leaves iPhones, Android mobes open to tracking • The Register https://www.theregister.co.uk/2017/03/10/mac_address_randomization/ 107 comments
- Contact Tracing in the Real World | Light Blue Touchpaper https://www.lightbluetouchpaper.org/2020/04/12/contact-tracing-in-the-real-world/ 80 comments
- Privacy-Preserving Contact Tracing - Apple and Google https://www.apple.com/covid19/contacttracing 15 comments
- https://bluetrace.io/static/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf 0 comments
Related searches:
Search whole site: site:abe-winter.github.io
Search title: Leakage paths for the Apple / Google bluetooth tracing system
See how to search.