Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.




1332 posts

Uber Geek
+1 received by user: 152
Inactive user


Topic # 113699 24-Jan-2013 22:11 Send private message

I saw this article and was interested in what others might think about it.

The article specifically states:

"The Bluetooth Address collected is not related to a specific device or an individual."

Which piqued my interest as I thought any sort of analysis between two points would require information relating to a particular device be collected, would it not?

Blip Systems' YouTube video shows that analysis of a particular Bluetooth device is measured between two points and the data is stored on a server and that data presented to the people collecting it.

Surely this is not a good idea, given that Google were recently stopped from doing pretty much the same thing globally with Wi-Fi network data.

The obvious response is, of course, "turn off your Bluetooth" but I think this is a case of implementing something wrong then telling people they can opt out.

Create new topic
BDFL - Memuneh
57900 posts

Uber Geek
+1 received by user: 9502

Administrator
Trusted
Geekzone
Subscriber

  Reply # 750462 24-Jan-2013 22:16 Send private message

Google's collection of WiFi data was different in that it was collecting a lot more than AP MAC addresses, location and strength. It was collecting payloads as well.

The only information required in this case is a device identifier. The device id is encrypted and stored. You only need the encrypted device id for comparison in two points, nothing else. There's nothing saying "this device id belongs to such individual".





2477 posts

Uber Geek
+1 received by user: 330


  Reply # 750464 24-Jan-2013 22:17 Send private message

I gyess it can identify unique devices but cannot tell who the device belongs to. 

I wonder if your have your bluetooth device hidden, which I do, if the system can see those devices?




Jolla C
Nokia N1
Nokia N9
Nokia E7
HP Touchpad
Dell Inspiron 14z i5


 

 



2 posts

Wannabe Geek

Trusted
BLIP Systems

  Reply # 750477 24-Jan-2013 23:10 Send private message

Hi!

I´m the Marketing Coordinator at BLIP Systems and will be more than happy to answer any questions concerning Bluetooth tracking.

For Bluetooth privacy concerns we have made this document:

http://issuu.com/blipsystems/docs/bluetooth_tracking_privacy_concerns

Please let me know what you think!

Regards,
Christian



1332 posts

Uber Geek
+1 received by user: 152
Inactive user


  Reply # 750875 25-Jan-2013 16:53 Send private message

BlipTrack: Hi!

I´m the Marketing Coordinator at BLIP Systems and will be more than happy to answer any questions concerning Bluetooth tracking.

For Bluetooth privacy concerns we have made this document:

http://issuu.com/blipsystems/docs/bluetooth_tracking_privacy_concerns

Please let me know what you think!

Regards,
Christian


Thanks for the reply, your link was most informative. The article posted at GeekZone, strictly speaking, is incorrect regarding the collection of device specific data (which is why I decided to investigate further) but of course this in no way translates into personally identifying data.

Do Beca/Blip Systems possess the necessary capability to decrypt the MAC address hashes at a later date for the purpose of, for example, law enforcement?

Re-hashing the original hash daily is a nice touch, I will admit. Good on ya ;-)

2594 posts

Uber Geek
+1 received by user: 1085


  Reply # 750882 25-Jan-2013 16:58 Send private message

Ah...the paranoid brigade starts again. Quick everyone, put your tin foil hats on! Lol





Always be yourself, unless you can be Batman, then always be the Batman



2 posts

Wannabe Geek

Trusted
BLIP Systems

  Reply # 750945 25-Jan-2013 20:21 Send private message

Dear 1080P

No, it is not possible to revert hash codes back to Bluetooth, when using a SHA-256 algorithm*.
* SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. This makes it suitable for password validation, challenge hash authentication, anti-tamper, digital signatures.

Regards,
Christian



1141 posts

Uber Geek
+1 received by user: 380


  Reply # 751043 25-Jan-2013 23:46 Send private message

Okay so I'm going to act paranoid here. :P

You don't need to decrypt the hashes, you just need too find which mac address generates which hash.

There's only 2^48 unique mac addresses out there. Less if you know which brand of Bluetooth chipset your target uses.

You can do 65 million sha256 hashes per second on a $200 GPU

2^48 / 65000000 = 4.3 x 10^6 seconds = 50 days

If you to buy a bunch of GPUs, then you can calculate the hash for each possible mac address with the daily salt every day. Right?

Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

IBM remote work recall a red herring
Posted 29-May-2017 19:15


RBI2 bidders at Rural Connectivity Symposium
Posted 29-May-2017 12:50


Edifier R1700BT speakers review: Luxury Bluetooth sounds
Posted 28-May-2017 13:06


National AI group launching next month
Posted 25-May-2017 09:54


New Zealand Digital Future, according to tech companies
Posted 25-May-2017 09:51


New Microsoft Surface Pro delivers outstanding battery life, performance
Posted 25-May-2017 09:34


Garmin VIRB 360 brings immersive 360-degree 5.7K camera experience
Posted 25-May-2017 09:30


Telecommunications monitoring report: Are you being served?
Posted 24-May-2017 11:54


NetValue partners with CRM Provider SugarCRM
Posted 23-May-2017 20:04


Terabyte looms as Vocus users download 430GB a month
Posted 19-May-2017 14:51


2degrees tips into profit after seven lean years
Posted 19-May-2017 09:47


2degrees growth story continues
Posted 17-May-2017 15:25


Symantec Blocks 22 Million Attempted WannaCry Ransomware Attacks Globally
Posted 17-May-2017 12:41


HPE Unveils Computer Built for the Era of Big Data
Posted 17-May-2017 12:39


Samsung Galaxy S8 Plus review: Beautiful, feature-packed
Posted 16-May-2017 20:14



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.