{"id":37649,"date":"2026-03-01T21:47:02","date_gmt":"2026-03-01T20:47:02","guid":{"rendered":"https:\/\/www.mapaho.com\/?p=37649"},"modified":"2026-03-01T21:47:02","modified_gmt":"2026-03-01T20:47:02","slug":"fingerprints-in-the-air","status":"publish","type":"post","link":"https:\/\/www.mapaho.com\/en\/fingerprints-in-the-air\/","title":{"rendered":"Fingerprints in the Air"},"content":{"rendered":"\n<h1 id=\"wd-82b337ee\" class=\"wp-block-wd-title title\">Your devices are screaming \u2014 The invisible fingerprints that every modern device leaves behind<\/h1>\n\n\n\n<p id=\"wd-4ccd3658\" class=\"wp-block-wd-paragraph\">Every wireless device you own constantly emits radio signals. Not only when you call or browse the Internet \u2014 <em>all the time<\/em>. These transmissions are not encrypted private communications between your device and a cell tower. They are public radio broadcasts, readable by anyone in range who has the right receiver.<\/p>\n\n\n\n<p id=\"wd-5224d714\" class=\"wp-block-wd-paragraph\">And the receivers are cheap. A Nordic Semiconductor BLE sniffer. An RTL-SDR dongle. A Raspberry Pi with a consumer Wi-Fi adapter. All you need is to passively capture the invisible fingerprints your devices spew into the air every second of every day.<\/p>\n\n\n\n<p id=\"wd-f2104563\" class=\"wp-block-wd-paragraph\">This is not theoretical. It is physics. Radio waves travel in all directions. Your phone does not whisper to a single access point \u2014 it calls into a room, a street, a building. And anyone listening can hear it.<\/p>\n\n\n\n<h2 id=\"wd-aaaf15e4\" class=\"wp-block-wd-title title\">WLAN Probe Requests: Your phone sends your network history<\/h2>\n\n\n\n<p id=\"wd-a44cb8c2\" class=\"wp-block-wd-paragraph\">When WLAN is enabled on your phone, it does not wait passively for networks to appear. It actively searches for them by sending <strong>Probe Requests<\/strong> \u2014 small radio frames that essentially ask: \u201cIs <em>MyHomeNetwork<\/em> here? What about <em>CorporateWiFi<\/em>? How about <em>Hilton_Guest<\/em>?\u201d<\/p>\n\n\n\n<p id=\"wd-b03b5511\" class=\"wp-block-wd-paragraph\">Each Probe Request contains an SSID: the name of a network your device has connected to before. Your device runs through its list of preferred networks and sends each name in sequence. That means your phone constantly proclaims:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The name of your home network<\/li>\n\n\n\n<li>Your work Wi\u2011Fi (reveals your employer)<\/li>\n\n\n\n<li>Hotel and airport networks (reveal your travel history)<\/li>\n\n\n\n<li>Caf\u00e9 and restaurant networks (reveal your habits)<\/li>\n\n\n\n<li>The security type your device expects for each network<\/li>\n<\/ul>\n\n\n\n<p id=\"wd-7f2a94aa\" class=\"wp-block-wd-paragraph\">This is not a side channel or a clever attack. It is how WLAN is designed. The 802.11 specification defines Probe Requests as a standard discovery mechanism. Your phone sends them on multiple channels, unencrypted, for anyone to receive.<\/p>\n\n\n\n<p id=\"wd-4274f504\" class=\"wp-block-wd-paragraph\">A passive receiver captures these probes and sees a device MAC address paired with every SSID it searches for. Over time, a travel diary emerges: This device was at the Marriott in Frankfurt, connected to \u201cGoogleGuest&#8221; and had a home network named \u201cMueller_Family_5G&#8221;. These are not metadata \u2014 this is a profile.<\/p>\n\n\n\n<h2 id=\"wd-9a6ab59b\" class=\"wp-block-wd-title title\">BLE: A multifaceted fingerprint<\/h2>\n\n\n\n<p id=\"wd-23217144\" class=\"wp-block-wd-paragraph\">Bluetooth Low Energy is even more informative than WLAN. Where a WLAN Probe Request reveals a network name, a single BLE Advertisement can reveal a dozen identifying features at once.<\/p>\n\n\n\n<p id=\"wd-6c5076a3\" class=\"wp-block-wd-paragraph\">Every BLE device sends Advertisements on three dedicated channels (37, 38, and 39) to announce its presence. These Advertisements carry structured data fields that together form a rich, layered fingerprint:<\/p>\n\n\n\n<p id=\"wd-3e041c22\" class=\"wp-block-wd-paragraph\"><strong>Appearance Values<\/strong> \u2014 A 16-bit code declaring <em>what<\/em> the device is. A phone (Appearance <code>0xC0<\/code>), a smartwatch (<code>0x00C1<\/code>), a pair of headphones (<code>0x0941<\/code>), a tracking tag. Bluetooth SIG assigns hundreds of these categories. Your device proclaims its type in every Advertisement.<\/p>\n\n\n\n<p id=\"wd-0236c594\" class=\"wp-block-wd-paragraph\"><strong>Service UUIDs<\/strong> \u2014 Standardized identifiers that reveal exactly what a device can do. A heart rate monitor advertises UUID <code>0x180D<\/code>. an audio sink advertises <code>0x110B<\/code>. A blood pressure monitor advertises <code>0x1810<\/code>. These are not optional \u2014 devices send them so other Bluetooth devices can recognize their capabilities. But everyone else can see them too.<\/p>\n\n\n\n<p id=\"wd-2e77606b\" class=\"wp-block-wd-paragraph\"><strong>Manufacturer-specific data<\/strong> \u2014 A payload that begins with a company identifier assigned by Bluetooth SIG. Apple is <code>0x004C<\/code>. Samsung is <code>0x0078<\/code>. Google is <code>0x00E0<\/code>. After the company ID follow proprietary data that often encodes device model, firmware version, and status information. This data is sent in clear text.<\/p>\n\n\n\n<p id=\"wd-7b591640\" class=\"wp-block-wd-paragraph\"><strong>Local device names<\/strong> \u2014 Many devices include a human-readable name in their Advertisements. \u201cAirPods Pro.&#8221; \u201c[TV] Samsung 65Q80.&#8221; \u201cFitbit Charge 5.&#8221; \u201cOsmoPocket3-A7F2.&#8221; These names appear as plain text in the radio signal.<\/p>\n\n\n\n<p id=\"wd-d86c78c6\" class=\"wp-block-wd-paragraph\"><strong>Google Fast Pair Model IDs<\/strong> \u2014 Android devices using Google\u2019s Fast-Pair protocol broadcast a 3-byte model ID under Service-UUID <code>0xFE2C<\/code>. This is not a category \u2014 it is a specific product identifier. Model ID <code>0xA1B2C3<\/code> points to exactly one product in Google\u2019s database. In discoverable mode, this ID is transmitted in clear text, so anyone nearby can identify the exact make and model of your headphones, earbuds, or watch.<\/p>\n\n\n\n<p id=\"wd-08bc0c93\" class=\"wp-block-wd-paragraph\"><strong>TX Power Level<\/strong> \u2014 The transmit power reported in the Advertisement, intended for distance estimation. Combined with the received signal strength (RSSI), this not only reveals <em>what<\/em> a device is, but roughly <em>where<\/em> it is located.<\/p>\n\n\n\n<p id=\"wd-f405dfd0\" class=\"wp-block-wd-paragraph\"><strong>Advertising intervals and channel patterns<\/strong> \u2014 The timing between advertisements and the channel sequence (37 \u2192 38 \u2192 39) create a behavioral fingerprint. Different chipsets have different timing precision. Different firmware versions have different interval configurations. Even if everything else is randomized, these physical characteristics remain.<\/p>\n\n\n\n<p id=\"wd-8331d69e\" class=\"wp-block-wd-paragraph\">All of this information is continuously broadcast to everyone, with no authentication or encryption. A passive receiver in range \u2014 typically 10 to 100 meters \u2014 captures every field.<\/p>\n\n\n\n<h2 id=\"wd-fd347dfb\" class=\"wp-block-wd-title title\">The devices that reveal everything<\/h2>\n\n\n\n<p id=\"wd-20bdc829\" class=\"wp-block-wd-paragraph\">Nearly every wireless device you interact with contributes to your radio fingerprint. Here is what different device categories reveal:<\/p>\n\n\n\n<h3 id=\"wd-e7b6a7e0\" class=\"wp-block-wd-title title\">Smartphones<\/h3>\n\n\n\n<p id=\"wd-83e44573\" class=\"wp-block-wd-paragraph\">The biggest culprits. A typical smartphone simultaneously sends WLAN probe-requests (exposes your network history), BLE advertisements (exposes manufacturer, device type, and service capabilities), and often Google Fast Pair or Apple Handoff data. With WLAN and Bluetooth enabled, a smartphone creates a rich, cross-layer fingerprint that is trivially trackable across locations.<\/p>\n\n\n\n<h3 id=\"wd-11892b50\" class=\"wp-block-wd-title title\">Smartwatches and Fitness Trackers<\/h3>\n\n\n\n<p id=\"wd-a6333b6b\" class=\"wp-block-wd-paragraph\">These devices advertise health-related service UUIDs such as heart rate (<code>0x180D<\/code>), running speed (<code>0x1814<\/code>) and environment sensing (<code>0x181A<\/code>). Their Appearance Values identify them as wrist-worn devices. Some transmit sensor data directly in their advertisement payload \u2014 your current heart rate, step count, or activity status, in the clear, readable by anyone.<\/p>\n\n\n\n<h3 id=\"wd-6dbf297a\" class=\"wp-block-wd-title title\">Headphones and Earbuds<\/h3>\n\n\n\n<p id=\"wd-f0138f3a\" class=\"wp-block-wd-paragraph\">Audio devices reveal their function through audio-sink and source service UUIDs. Many high-end earbuds from Sony, Bose, JBL, and Beyerdynamic share the same Airoha chipset, identifiable by a specific 128-bit service UUID (<code>5052494D-2DAB-0341-6972-6F6861424C45<\/code>). This means a passive receiver can not only identify \u201cheadphones\u201d but also the exact chipset family, narrowing the product down to a handful of models.<\/p>\n\n\n\n<h3 id=\"wd-5e2995b6\" class=\"wp-block-wd-title title\">Dashcams and Action Cameras<\/h3>\n\n\n\n<p id=\"wd-a4f16e26\" class=\"wp-block-wd-paragraph\">These create WLAN hotspots for the companion app pairing and broadcast SSIDs like \u201cOsmoPocket3-A7F2&#8243; or \u201cGoProHERO12-1234&#8243;. Some also send BLE pairing beacons. A device that should be inconspicuous on a dashboard proclaims its exact product model to anyone in radio range.<\/p>\n\n\n\n<h3 id=\"wd-266ea9d3\" class=\"wp-block-wd-title title\">Smart Home Devices<\/h3>\n\n\n\n<p id=\"wd-06e3a58f\" class=\"wp-block-wd-paragraph\">Environmental sensors from firms like Ruuvi, Minew, and Laird broadcast temperature, humidity, air pressure, and door\/window status in their BLE advertisement payloads. A passive receiver passing by a building can inventory the smart-home sensors inside \u2014 and read their measurements.<\/p>\n\n\n\n<h3 id=\"wd-8983782a\" class=\"wp-block-wd-title title\">Tracking Tags<\/h3>\n\n\n\n<p id=\"wd-252cda3a\" class=\"wp-block-wd-paragraph\">AirTag, Samsung SmartTag and Tile trackers each have distinct protocol signatures. Apple Find My devices use vendor data type <code>0x12<\/code> with a rotating 22-byte public key. Samsung SmartTags use vendor ID <code>0x0078<\/code> with a characteristic <code>0x20<\/code>-frame pattern. Tile uses its own service UUID. Each protocol is immediately recognizable to a passive observer.<\/p>\n\n\n\n<h2 id=\"wd-f4c97019\" class=\"wp-block-wd-title title\">The Bluetooth SIG: A public decoding key<\/h2>\n\n\n\n<p id=\"wd-f36a1914\" class=\"wp-block-wd-paragraph\">All these hex codes and UUIDs may sound cryptic, but their interpretation requires no reverse engineering. The Bluetooth Special Interest Group (SIG) \u2014 the industry body that manages the Bluetooth standard \u2014 publishes comprehensive databases of all assigned numbers as open YAML files in a public repository. Anyone can download them.<\/p>\n\n\n\n<p id=\"wd-a5837c05\" class=\"wp-block-wd-paragraph\"><strong>Company Identifiers<\/strong> \u2014 The SIG maintains a register of nearly 4,000 company codes. Every manufacturer delivering a Bluetooth product registers a 16-bit identifier. Apple is <code>0x004C<\/code>. Samsung is <code>0x0078<\/code>. Airoha Technology is <code>0x00CC<\/code>. Ericsson is <code>0x0000<\/code>. When your device sends manufacturer-specific data, the first two bytes are a company code that directly points to a name in this public list. There is no ambiguity and no decryption needed \u2014 just a table lookup.<\/p>\n\n\n\n<p id=\"wd-7386ef1e\" class=\"wp-block-wd-paragraph\"><strong>Service UUIDs<\/strong> \u2014 The SIG defines over 200 standardized 16-bit Service UUIDs. Heart Rate is <code>0x180D<\/code>. Blood Pressure is <code>0x1810<\/code>. Environmental Sensing is <code>0x181A<\/code>. Fitness Machine is <code>0x1826<\/code>. Insulin Delivery is <code>0x183A<\/code>. Each UUID has a defined meaning, a defined data format, and a published specification. When a device advertises a Service UUID, it declares its exact function in a standard industry vocabulary that anyone can read.<\/p>\n\n\n\n<p id=\"wd-fbe043a7\" class=\"wp-block-wd-paragraph\"><strong>Appearance Values<\/strong> \u2014 The SIG publishes a structured taxonomy of device categories and subcategories. The top 10 bits of the Appearance value identify the category \u2014 Phone, Computer, Watch, Tag, Keyring, Heart Rate Sensor, Audio Sink, Hearing Aid, Glucose Meter, Domestic Appliance, etc. The lower 6 bits further refine: not just \u201cComputer\u201d, but \u201cLaptop\u201d or \u201cServer-class Computer\u201d. Not just \u201cWearable Audio Device\u201d, but \u201cEarbud\u201d or \u201cHeadset\u201d. A single 16-bit number reveals exactly what kind of device is sending.<\/p>\n\n\n\n<p id=\"wd-60130680\" class=\"wp-block-wd-paragraph\">These are not leaked internal documents or reverse-engineered databases. It is the official, public specification that manufacturers <em>must<\/em> use. The Bluetooth SIG publishes it so devices interoperate. The side effect is that anyone with a passive receiver can look up what each device in range is, who made it, and what it can do \u2014 using the same public tables that the devices themselves rely on.<\/p>\n\n\n\n<h2 id=\"wd-6797f4cb\" class=\"wp-block-wd-title title\">When fingerprinting becomes a weapon: The Airoha RACE vulnerability<\/h2>\n\n\n\n<p id=\"wd-16a020b6\" class=\"wp-block-wd-paragraph\">All of the above described is passive observation \u2014 a receiver quietly cataloging what devices send. But what happens if the information in these transmissions opens the door to active attacks?<\/p>\n\n\n\n<p id=\"wd-454aed96\" class=\"wp-block-wd-paragraph\">In December 2025, security researchers Dennis Heinze and Frieder Steinmetz <a href=\"https:\/\/media.ccc.de\/v\/39c3-bluetooth-headphone-jacking-a-key-to-your-phone\">presented at 39C3<\/a> a chain of vulnerabilities in Airoha Bluetooth audio chips, a MediaTek subsidiary. Airoha does not sell headphones under its own name \u2014 the company makes the chipsets used in headphones from Sony, Bose, JBL, Beyerdynamic, Marshall, Jabra and others. If you own wireless premium earbuds or headphones, the likelihood is high that an Airoha chip is inside.<\/p>\n\n\n\n<p id=\"wd-e2f1519d\" class=\"wp-block-wd-paragraph\">The problem is a proprietary protocol named <strong>RACE<\/strong> (Really Advanced Chipset Extension). Airoha chips expose a RACE GATT service over BLE that enables deep control over the chipset \u2014 read\/write access to flash memory and RAM, firmware manipulation, and device configuration. The service is advertised in every BLE advertisement of the headphones, identifiable by a specific 128-bit UUID (<code>5052494D-2DAB-0341-6972-6F6861424C45<\/code>). And crucially: no authentication is required for the connection.<\/p>\n\n\n\n<p id=\"wd-69fa5cda\" class=\"wp-block-wd-paragraph\">The attack chain works like this:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Passive identification.<\/strong> An attacker within BLE range (~10-100m) sees the RACE GATT service UUID in the headphones\u2019 Advertisement. This identifies the device unequivocally as an Airoha chipset. No interaction with the device is required \u2014 the Advertisement is broadcast continuously.<\/li>\n\n\n\n<li><strong>Flash memory extraction (CVE-2025-20700).<\/strong> The attacker connects to the RACE service and reads the chip\u2019s flash memory. This is done without authentication \u2014 no pairing, no PIN, no user prompt on the headphones. The flash dump contains stored Bluetooth <strong>Link Keys<\/strong>: the shared secrets that authenticate the trusted connection between the headphones and the owner\u2019s phone.<\/li>\n\n\n\n<li><strong>Phone impersonation (CVE-2025-20701).<\/strong> With the extracted Link Key, the attacker can impersonate the headphones to the owner\u2019s phone over Bluetooth Classic. The phone believes it is connecting to its trusted headphones. From this position the attacker could potentially access phone functions exposed over Bluetooth \u2014 audio, call management, and, depending on the phone\u2019s Bluetooth stack, possibly more.<\/li>\n<\/ol>\n\n\n\n<p id=\"wd-dbc13118\" class=\"wp-block-wd-paragraph\">Three CVEs have been assigned: CVE-2025-20700 (unauthenticated flash reading), CVE-2025-20701 (authentication bypass via link-key extraction) and CVE-2025-20702 (RACE protocol information disclosure). Affected products include Sony WF-1000XM5, WH-1000XM5 and WH-1000XM6, Marshall Major V and Minor IV, Beyerdynamic AMIRON 300, Jabra Elite 8 Active and likely many other products built on the same chipsets.<\/p>\n\n\n\n<p id=\"wd-3d5f2e0c\" class=\"wp-block-wd-paragraph\">This is a concrete example of how the problem of \u201cinvisible fingerprints\u201d escalates beyond privacy. The same BLE Advertisement that reveals \u201cthese are Sony headphones with an Airoha chipset\u201d also reveals \u201cthis device is vulnerable to unauthenticated memory extraction and thus to access the owner\u2019s phone.\u201d The advertisement does not only reveal identity \u2014 it advertises an attack surface.<\/p>\n\n\n\n<h2 id=\"wd-5f5d4e46\" class=\"wp-block-wd-title title\">Why MAC Randomization doesn\u2019t save you<\/h2>\n\n\n\n<p id=\"wd-b1c7ad7d\" class=\"wp-block-wd-paragraph\">Modern devices randomize their MAC addresses to reduce tracking. It\u2019s a meaningful improvement \u2014 but far from sufficient. The MAC address is just one field in a rich advertisement. If everything else is equal, changing the MAC is like putting on a false mustache while wearing a name tag.<\/p>\n\n\n\n<p id=\"wd-09751b8a\" class=\"wp-block-wd-paragraph\"><strong>Static payloads outlive randomized MACs.<\/strong> Your device rotates its MAC address, but the Appearance value, the Service UUIDs, the manufacturer data, and the local name often remain constant. A receiver that sees Appearance <code>0x0941<\/code> + Service UUID <code>0x110B<\/code> + Manufacturer ID <code>0x004C<\/code> + local name \u201cAirPods Pro&#8221; does not need the MAC to know it is the same device.<\/p>\n\n\n\n<p id=\"wd-74d6e6a4\" class=\"wp-block-wd-paragraph\"><strong>Timing fingerprints are hardware-based.<\/strong> Different chipsets have measurably different advertising interval precision. Nordic Semiconductor nRF chips, for example, keep interval standard deviations under 5% of the mean \u2014 a level of precision that serves as a chipset fingerprint, independent of any software randomness. Advert intervals of 1022.5ms \u00b1 2% look different from intervals of 1285ms \u00b1 8%, even if the MAC changes every 15 minutes.<\/p>\n\n\n\n<p id=\"wd-4ac92ed9\" class=\"wp-block-wd-paragraph\"><strong>Channel-hopping patterns are deterministic.<\/strong> BLE advertisements occur on channels 37, 38, and 39 in sequence. Some implementations traverse these channels in a strict, predictable pattern \u2014 37 \u2192 38 \u2192 39 \u2192 37 \u2192 38 \u2192 39 \u2014 with over 80% determinism. This pattern persists across MAC rotations and can be used to link \u201cdifferent\u201d devices to the same physical radio.<\/p>\n\n\n\n<p id=\"wd-4488e538\" class=\"wp-block-wd-paragraph\"><strong>RSSI variance reveals movement patterns.<\/strong> A device carried by a person shows characteristic signal strength variations while walking. A stationary device (like a fixed tracker) shows little variance. This behavioral layer exists purely in the physics of radio propagation and cannot be randomized away.<\/p>\n\n\n\n<p id=\"wd-84c25572\" class=\"wp-block-wd-paragraph\"><strong>Cross-layer correlation breaks anonymity.<\/strong> If a phone transmits WLAN probes and BLE advertisements at the same time, the two signals can be correlated by timing, location, and behavioral patterns \u2014 even if each layer randomizes its MAC address. An identity across two protocols is harder to hide than an identity in a single protocol.<\/p>\n\n\n\n<h2 id=\"wd-32b8751f\" class=\"wp-block-wd-title title\">Find-My Networks and \u201cMacless Haystack&#8221;<\/h2>\n\n\n\n<p id=\"wd-9ed4e63f\" class=\"wp-block-wd-paragraph\">Apple\u2019s Find My network, Google\u2019s \u201cFind My Device\u201d and open-source alternatives like OpenHaystack have improved the cryptographic layer of tracking devices. Keys rotate. Payload data is encrypted for the owner. Some implementations even eliminate persistent MAC addresses entirely.<\/p>\n\n\n<!-- wp:wd:paragraph {\"blockId\":\"d06b8b01-8b43-479c-b172-0b3120f0da0e\"} -->\n<p id=\"wd-d06b8b01\" class=\"wp-block-wd-paragraph\">But these improvements address the <em>data<\/em> layer, not the <em>radio<\/em> layer. The fundamental problem remains: the device must emit a radio signal to be useful as a tracker. And that radio signal is public.<\/p>\n<!-- \/wp:post-content -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"28bb07f5-3c9c-4738-990b-67807058f672\"} -->\n<p id=\"wd-28bb07f5\" class=\"wp-block-wd-paragraph\">Anyone within about 100 meters of a Find-My beacon can:<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li><strong>Detect that a Find-My Beacon exists.<\/strong> Apple Find-My devices are identifiable by their vendor data frame type <code>0x12<\/code> under company ID <code>0x004C<\/code>. Google Find My Device beacons use service data UUID <code>0xFEE0<\/code>. The protocol identity is visible even when the key payload is encrypted.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Differentiate real devices from DIY beacons.<\/strong> Commercial Apple AirTags behave differently from DIY-nRF Find-My clones. Clones often exhibit more precise timing (nRF chip properties), more deterministic channel hopping, and a discrepancy between static MACs and rotating payloads. A behavioral scoring model can classify them with high confidence.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Track payload rotation patterns.<\/strong> Even with rotating keys, the <em>pattern<\/em> of rotation is observable. How often does the key change? Is the rotation interval constant? Does the MAC address rotate in sync with the payloads or independently? These meta-patterns are fingerprints.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Count and classify nearby trackers.<\/strong> A passive receiver can inventory all Find-My Beacons in range, classify them by protocol (Apple, Google, Samsung, Tile), and follow their movements relative to the observer \u2014 all without breaking encryption.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"e054fcde-5b76-4193-ab8b-2f63e5328d79\"} -->\n<p id=\"wd-e054fcde\" class=\"wp-block-wd-paragraph\">The \u201cMacless\u201d approaches are a step forward, but they do not render devices invisible. They make it harder to <em>identify<\/em> devices on the data layer while remaining fully visible on the radio layer. And for surveillance detection, knowing a tracking device is following you, visibility on the radio layer is decisive.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:title {\"blockId\":\"82e7bfcb-7f99-4bd7-9d61-81befe32b0c0\",\"content\":\"What can you do?\",\"htmlTag\":\"h2\"} -->\n<h2 id=\"wd-82e7bfcb\" class=\"wp-block-wd-title title\">What can you do?<\/h2>\n<!-- \/wp:title -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"6e8c18ad-1116-47b9-b5ae-237c9f73271a\"} -->\n<p id=\"wd-6e8c18ad\" class=\"wp-block-wd-paragraph\">Completely quiet radio silence would mean giving up wireless devices altogether, which for most people is not realistic. But understanding what your devices send is the first step to controlling your exposure.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"03b9c672-3fe3-414d-be24-726d8ad11723\"} -->\n<p id=\"wd-03b9c672\" class=\"wp-block-wd-paragraph\"><strong>Disable WLAN when you are not connected to a network.<\/strong> The biggest WLAN privacy leak \u2014 Probe Requests \u2014 only occur when your device searches for networks. If you don\u2019t actively use WLAN, turning it off stops the broadcast of your network history. Most phones have a quick switch for this.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph -->\n<p id=\"wd-b18eb9a4\" class=\"wp-block-wd-paragraph\"><strong>Check which devices actually need radio.<\/strong> Does your dashcam need WLAN on if you\u2019re not transferring footage? Does your fitness tracker need Bluetooth if you\u2019re not syncing? Every active radio module is a module that transmits.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"028e064a-3d5f-475b-b4c8-0f4aeb294dff\"} -->\n<p id=\"wd-028e064a\" class=\"wp-block-wd-paragraph\"><strong>Use Airplane Mode in sensitive places.<\/strong> If you need to minimize your radio footprint \u2014 in situations where you worry about surveillance \u2014 turning off all radio modules at once is the most effective single measure.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"81c18ab4-79ef-4de8-9121-11d8e790b5e0\"} -->\n<p id=\"wd-81c18ab4\" class=\"wp-block-wd-paragraph\"><strong>Be aware that \u201csmart\u201d devices also transmit in idle.<\/strong> A smart-home sensor does not stop transmitting when no one looks at the app. A tracker tag does not stop transmitting when it lies in your pocket. Wireless devices are designed to always be on and always transmitting.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"9f391f75-a00c-4c66-bdd4-849c0597ba54\"} -->\n<p id=\"wd-9f391f75\" class=\"wp-block-wd-paragraph\"><strong>Understand your own RF footprint.<\/strong> Surveillance and detection tools can show you exactly what your devices send and how they appear to a passive observer. Knowing your own fingerprint is the foundation to controlling it.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:title {\"blockId\":\"4c3080ea-f5a4-4c30-a52c-5df1960c569b\",\"content\":\"Conclusion\",\"htmlTag\":\"h2\"} -->\n<h2 id=\"wd-4c3080ea\" class=\"wp-block-wd-title title\">Conclusion<\/h2>\n<!-- \/wp:title -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"8b6a1481-456c-4a78-bddf-70d5a31a1fdd\"} -->\n<p id=\"wd-8b6a1481\" class=\"wp-block-wd-paragraph\">We invest enormous effort in digital privacy, encrypted messages, VPNs, privacy-respecting browsers, cookie-consent dialogs. But beneath all this software, the physical radio layer of every wireless device you carry continuously broadcasts identity information into the air.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"d23d535c-acea-4aa1-8174-2a16843b87ac\"} -->\n<p id=\"wd-d23d535c\" class=\"wp-block-wd-paragraph\">This is not a bug. This is how radio protocols are designed. WLAN Probe Requests, BLE Advertisements, tracker beacons, they all work by broadcasting structured, identifying data on public radio frequencies. Anyone with commonly available hardware can receive and interpret these signals. No hacking needed. No laws broken. Just physics.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"08c8bfa0-0d31-4cec-989c-8fab0899d31d\"} -->\n<p id=\"wd-08c8bfa0\" class=\"wp-block-wd-paragraph\">MAC randomization helps. Encrypted payloads help. But as long as a device transmits a radio signal, that signal contains information about what the device is, what it can do, who made it, and how it behaves. The fingerprint may change its shape, but it does not disappear.<\/p>\n<!-- \/wp:wd\/paragraph -->\n\n<!-- wp:wd\/paragraph {\"blockId\":\"ec9af2f1-8661-4966-89c9-de2b95a030ee\"} -->\n<p id=\"wd-ec9af2f1\" class=\"wp-block-wd-paragraph\">Privacy is not only a software problem. It is a radio problem. And the first step to solving it is understanding that your devices are screaming.<\/p>\n<!-- \/wp:wd\/paragraph -->","protected":false},"excerpt":{"rendered":"<p>But these improvements address the data layer, not the radio layer. The fundamental problem remains: the device must emit a<\/p>\n","protected":false},"author":1,"featured_media":37664,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[93,98],"tags":[],"class_list":["post-37649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.mapaho.com\/wp-content\/uploads\/2026\/02\/gotailme-blueprint.jpeg?fit=1376%2C768&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/posts\/37649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/comments?post=37649"}],"version-history":[{"count":2,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/posts\/37649\/revisions"}],"predecessor-version":[{"id":37653,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/posts\/37649\/revisions\/37653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/media\/37664"}],"wp:attachment":[{"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/media?parent=37649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/categories?post=37649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mapaho.com\/en\/wp-json\/wp\/v2\/tags?post=37649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}