Security & privacy in the Tile tracking system: the first (public) security analysis of its protocol. 🐾🗺️🎯👨🏻💻🛠️
Security researchers Akshaya Kumar, Anna Raymaker, and Michael Specter from the Georgia Institute of Technology released the first public comprehensive security analysis of Tile’s Bluetooth tracking system.
The Tile Protocol is a Bluetooth-based communication system used by Tile tracking devices to locate lost items within a 30–100 meter (100–300 foot) range by connecting to a smartphone app. When out of range, it leverages a “crowd GPS” network of other Tile users to update locations and has been integrated into Amazon’s Sidewalk network.
Apparently, Tile generates exactly 8,640 rotating Bluetooth identifiers per device - one every 15 minutes for 90 days - and then reuses the exact same set again. So if someone records all your Tile’s signals over three months, they can recognize and track your device indefinitely.
Hell of a research - full of details and insights into the second-biggest tracking system in the world. Enjoy the read!
More details:
Security and Privacy Analysis of Tile’s Location Tracking Protocol [PDF]: https://arxiv.org/abs/2510.00350
目录
最新
- Multiple vulnerabilities in [Censored] electric motorcycles: how to hack a vehicle without one. ⚡🏍️📱🔬🤭
- Hacking wireless security cameras with a laser: from 120 meters away with a 100% success rate! 🛜📹 🔫☠️🥷🏻
- Hack 3D printers into robots: cheap, easy-to-manage & modify lab automation. 📇🛠️🤖🦾🌟
- New attack on OpenClaw or similar AI agents that infects them with “malicious skills.” 🤖💉👾😵💫🤡
- Hacking the Freebox HD (TV/Internet box): how one can use the DooM to exploit a router. 📺📦🔌👨🏻💻💰
- Jamming and spoofing of GPS on ships: real-world attacks on global navigation systems 🛳️🧭😵💫👁️👽
- Hacking ECU of heavy-duty vehicles (trucks, buses, etc.): How to attack the J1939 protocol at scale. 🚜🔧👨🏻💻🦠🎉
- Hacking crypto (cryptography! 🤪) without hard math: how to find bugs in implementation.👨🏻💻🔏👩🏿💻🤔💥