![]() This was done in 12 days,a shoestring budget (3000 kr) and the technical knowledge about exploiting vulnerabilities in WiFi Access Points and Bluetooth. mapped encrypted and unencrypted WiFi networks in the covered area in Oslo.generated repeated data points of specific devices that allowed the author to pinpoint movement patterns and habits of several device owners through Oslo, some with their full name on their devices.This report is the culmination of 5 000 000 logged data points from MAC addresses and WiFi Access Points, which in turn This report will show that it is possible to do not only tracking of a single individual but masstracking/surveillance of a large city as well, i.e Oslo. The author wants to show that these technologies are vulnerable to tracking/surveillance without the individual’s notice and online connection. With the ever-increasing use of WIFI and Bluetooth devices in the daily life of the average citizen, many will own at least one device, if not several, which can be used as tracking devices. location tracking from 3rd parties without the user’s knowledge. This report goes through the vulnerabilities of WIFI and Bluetooth in terms of privacy i.e. SP1-Location-Tracking-of-WIFI-Access-Points-and-Bluetooth-Devices-redacted Download
0 Comments
Leave a Reply. |