• Re: What are the privacy implications of 802.11az Wi-Fi Ranging?

    From Andy Burns@21:1/5 to Andrews on Mon Nov 11 16:36:45 2024
    XPost: comp.mobile.android, alt.internet.wireless

    Andrews wrote:

    apparently those on Android 15 now have something defined in 802.11az
    which is apparently called 802.11az Wi-Fi Ranging (which new, to me).

    Yes new to me too, do any phones support it yet? I see 802.11az gets a
    mention in some of the recent Qualcomm vulnerabilities.

    The 5G chipsets we get over here don't support mmWave frequencies, just sub-6GHz, and therefore no mmWave aerial, so probably USA devices with
    mmWave will be able to share a mmWave aerial between 5G and WiFi aerials
    to support 802.11az?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrews@21:1/5 to All on Mon Nov 11 16:19:28 2024
    XPost: comp.mobile.android, alt.internet.wireless

    While I'm on Android 13 (probably for a while) on my Galaxy A32-5G (which
    is still going strong after T-Mobile gave me a bunch in 2021 for free), apparently those on Android 15 now have something defined in 802.11az
    which is apparently called 802.11az Wi-Fi Ranging (which new, to me).

    Apparently... 802.11az 802.11az Wi-Fi Ranging is indoor location tech. <https://www.androidauthority.com/android-15-wi-fi-ranging-3498128/>

    1. For the most part, approximate location of devices was performed
    by measuring the received signal strength (RSS) from multiple Wi-Fi
    access points (APs) which offered 10-15 meter accuracy at best.

    2. Android added support for Wi-Fi RTT with the release of Android 9
    in 2018, and many mobile devices today have Wi-Fi chips that support
    the positioning technology.

    3. The IEEE Standards Association created the 802.11mc, or Wi-Fi Round
    Trip Time (RTT) standard to allow for more precise Wi-Fi-based
    positioning. This standard uses Fine Timing Measurement (FTM)
    to enable location tracking with 1-2 meter accuracy.

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
    with FTM measures the time-of-flight (ToF) between an RF packet
    sent from your phone to several nearby APs. While Wi-Fi RTT with
    FTM worked over both the standard 2.4 & 5GHz bands, it was never
    widely deployed in the field, so you¢ve probably never used it

    5. While Wi-Fi RTT with FTM is already fairly accurate, the IEEE SA
    was able to improve upon it even further with the 802.11az standard,
    also known as Wi-Fi Ranging. Wi-Fi Ranging with FTM allows for
    <1 meter accuracy (down to 0.4 meter), so it¢s even more accurate
    than Wi-Fi RTT with FTM. Not only that, but it uses double the
    bandwidth (160Mhz vs. 80MHz), supports the 6GHz band, is scalable
    to a large number of clients, is more secure and protected,
    and supports dynamic measurement rates.

    6. 802.11az Wi-Fi Ranging can only work on Android 15 devices with
    Wi-Fi chips (such as Qualcomm¢s FastConnect 7900 connectivity chip)
    that support Wi-Fi Ranging but Wi-Fi Ranging is slightly less
    accurate than Ultra wideband (UWB) and Bluetooth Channel Sounding,
    but 802.11az Wi-Fi Ranging has better range than UWB & BT has.

    7. To take advantage of 802.11az Wi-Fi Ranging, any Wi-Fi access
    points (APs) that support Wi-Fi 6 or later will likely need to
    burn in a firmware update to support 802.11az location tracking.

    Having set that baseline, my question is...
    Q: What are the privacy implications of 802.11az Wi-Fi Ranging?
    A: ?

    .

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger@21:1/5 to andrews@spam.net on Mon Nov 11 22:17:24 2024
    XPost: comp.mobile.android, alt.internet.wireless

    On Mon, 11 Nov 2024 16:19:28 -0000 (UTC), Andrews
    <andrews@spam.net> wrote:

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
    with FTM measures the time-of-flight (ToF) between an RF packet
    sent from your phone to several nearby APs. While Wi-Fi RTT with
    FTM worked over both the standard 2.4 & 5GHz bands, it was never
    widely deployed in the field, so you¢ve probably never used it

    This may be a silly question but why would a phone be sending
    anything to APs that it doesn't know and therefore cannot use?
    --
    Roger

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From knuttle@21:1/5 to All on Mon Nov 11 17:27:36 2024
    XPost: comp.mobile.android, alt.internet.wireless

    T24gMTEvMTEvMjAyNCAxMToxOSBBTSwgQW5kcmV3cyB3cm90ZToNCj4gV2hpbGUgSSdtIG9u IEFuZHJvaWQgMTMgKHByb2JhYmx5IGZvciBhIHdoaWxlKSBvbiBteSBHYWxheHkgQTMyLTVH ICh3aGljaA0KPiBpcyBzdGlsbCBnb2luZyBzdHJvbmcgYWZ0ZXIgVC1Nb2JpbGUgZ2F2ZSBt ZSBhIGJ1bmNoIGluIDIwMjEgZm9yIGZyZWUpLA0KPiBhcHBhcmVudGx5IHRob3NlIG9uIEFu ZHJvaWQgMTUgbm93IGhhdmUgc29tZXRoaW5nIGRlZmluZWQgaW4gODAyLjExYXoNCj4gd2hp Y2ggaXMgYXBwYXJlbnRseSBjYWxsZWQgODAyLjExYXogV2ktRmkgUmFuZ2luZyAod2hpY2gg bmV3LCB0byBtZSkuDQo+IA0KPiBBcHBhcmVudGx5Li4uIDgwMi4xMWF6IDgwMi4xMWF6IFdp LUZpIFJhbmdpbmcgaXMgaW5kb29yIGxvY2F0aW9uIHRlY2guDQo+IDxodHRwczovL3d3dy5h bmRyb2lkYXV0aG9yaXR5LmNvbS9hbmRyb2lkLTE1LXdpLWZpLXJhbmdpbmctMzQ5ODEyOC8+ DQo+IA0KPiAxLiBGb3IgdGhlIG1vc3QgcGFydCwgYXBwcm94aW1hdGUgbG9jYXRpb24gb2Yg ZGV2aWNlcyB3YXMgcGVyZm9ybWVkDQo+ICAgICBieSBtZWFzdXJpbmcgdGhlIHJlY2VpdmVk IHNpZ25hbCBzdHJlbmd0aCAoUlNTKSBmcm9tIG11bHRpcGxlIFdpLUZpDQo+ICAgICBhY2Nl c3MgcG9pbnRzIChBUHMpIHdoaWNoIG9mZmVyZWQgMTAtMTUgbWV0ZXIgYWNjdXJhY3kgYXQg YmVzdC4NCj4gDQo+IDIuIEFuZHJvaWQgYWRkZWQgc3VwcG9ydCBmb3IgV2ktRmkgUlRUIHdp dGggdGhlIHJlbGVhc2Ugb2YgQW5kcm9pZCA5DQo+ICAgICBpbiAyMDE4LCBhbmQgbWFueSBt b2JpbGUgZGV2aWNlcyB0b2RheSBoYXZlIFdpLUZpIGNoaXBzIHRoYXQgc3VwcG9ydA0KPiAg ICAgdGhlIHBvc2l0aW9uaW5nIHRlY2hub2xvZ3kuDQo+IA0KPiAzLiBUaGUgSUVFRSBTdGFu ZGFyZHMgQXNzb2NpYXRpb24gY3JlYXRlZCB0aGUgODAyLjExbWMsIG9yIFdpLUZpIFJvdW5k DQo+ICAgICBUcmlwIFRpbWUgKFJUVCkgc3RhbmRhcmQgdG8gYWxsb3cgZm9yIG1vcmUgcHJl Y2lzZSBXaS1GaS1iYXNlZA0KPiAgICAgcG9zaXRpb25pbmcuIFRoaXMgc3RhbmRhcmQgdXNl cyBGaW5lIFRpbWluZyBNZWFzdXJlbWVudCAoRlRNKQ0KPiAgICAgdG8gZW5hYmxlIGxvY2F0 aW9uIHRyYWNraW5nIHdpdGggMS0yIG1ldGVyIGFjY3VyYWN5Lg0KPiANCj4gNC4gSW5zdGVh ZCBvZiByZWx5aW5nIG9uIHNpZ25hbCBzdHJlbmd0aCBtZWFzdXJlbWVudHMsIFdpLUZpIFJU VA0KPiAgICAgd2l0aCBGVE0gbWVhc3VyZXMgdGhlIHRpbWUtb2YtZmxpZ2h0IChUb0YpIGJl dHdlZW4gYW4gUkYgcGFja2V0DQo+ICAgICBzZW50IGZyb20geW91ciBwaG9uZSB0byBzZXZl cmFsIG5lYXJieSBBUHMuIFdoaWxlIFdpLUZpIFJUVCB3aXRoDQo+ICAgICBGVE0gd29ya2Vk IG92ZXIgYm90aCB0aGUgc3RhbmRhcmQgMi40ICYgNUdIeiBiYW5kcywgaXQgd2FzIG5ldmVy DQo+ICAgICB3aWRlbHkgZGVwbG95ZWQgaW4gdGhlIGZpZWxkLCBzbyB5b3XilpRlIHByb2Jh Ymx5IG5ldmVyIHVzZWQgaXQNCj4gDQo+IDUuIFdoaWxlIFdpLUZpIFJUVCB3aXRoIEZUTSBp cyBhbHJlYWR5IGZhaXJseSBhY2N1cmF0ZSwgdGhlIElFRUUgU0ENCj4gICAgIHdhcyBhYmxl IHRvIGltcHJvdmUgdXBvbiBpdCBldmVuIGZ1cnRoZXIgd2l0aCB0aGUgODAyLjExYXogc3Rh bmRhcmQsDQo+ICAgICBhbHNvIGtub3duIGFzIFdpLUZpIFJhbmdpbmcuIFdpLUZpIFJhbmdp bmcgd2l0aCBGVE0gYWxsb3dzIGZvcg0KPiAgICAgPDEgbWV0ZXIgYWNjdXJhY3kgKGRvd24g dG8gMC40IG1ldGVyKSwgc28gaXTilKwgZXZlbiBtb3JlIGFjY3VyYXRlDQo+ICAgICB0aGFu IFdpLUZpIFJUVCB3aXRoIEZUTS4gTm90IG9ubHkgdGhhdCwgYnV0IGl0IHVzZXMgZG91Ymxl IHRoZQ0KPiAgICAgYmFuZHdpZHRoICgxNjBNaHogdnMuIDgwTUh6KSwgc3VwcG9ydHMgdGhl IDZHSHogYmFuZCwgaXMgc2NhbGFibGUNCj4gICAgIHRvIGEgbGFyZ2UgbnVtYmVyIG9mIGNs aWVudHMsIGlzIG1vcmUgc2VjdXJlIGFuZCBwcm90ZWN0ZWQsDQo+ICAgICBhbmQgc3VwcG9y dHMgZHluYW1pYyBtZWFzdXJlbWVudCByYXRlcy4NCj4gDQo+IDYuIDgwMi4xMWF6IFdpLUZp IFJhbmdpbmcgY2FuIG9ubHkgd29yayBvbiBBbmRyb2lkIDE1IGRldmljZXMgd2l0aA0KPiAg ICAgV2ktRmkgY2hpcHMgKHN1Y2ggYXMgUXVhbGNvbW3ilKwgRmFzdENvbm5lY3QgNzkwMCBj b25uZWN0aXZpdHkgY2hpcCkNCj4gICAgIHRoYXQgc3VwcG9ydCBXaS1GaSBSYW5naW5nIGJ1 dCBXaS1GaSBSYW5naW5nIGlzIHNsaWdodGx5IGxlc3MNCj4gICAgIGFjY3VyYXRlIHRoYW4g VWx0cmEgd2lkZWJhbmQgKFVXQikgYW5kIEJsdWV0b290aCBDaGFubmVsIFNvdW5kaW5nLA0K PiAgICAgYnV0IDgwMi4xMWF6IFdpLUZpIFJhbmdpbmcgaGFzIGJldHRlciByYW5nZSB0aGFu IFVXQiAmIEJUIGhhcy4NCj4gDQo+IDcuIFRvIHRha2UgYWR2YW50YWdlIG9mIDgwMi4xMWF6 IFdpLUZpIFJhbmdpbmcsIGFueSBXaS1GaSBhY2Nlc3MNCj4gICAgIHBvaW50cyAoQVBzKSB0 aGF0IHN1cHBvcnQgV2ktRmkgNiBvciBsYXRlciB3aWxsIGxpa2VseSBuZWVkIHRvDQo+ICAg ICBidXJuIGluIGEgZmlybXdhcmUgdXBkYXRlIHRvIHN1cHBvcnQgODAyLjExYXogbG9jYXRp b24gdHJhY2tpbmcuDQo+IA0KPiBIYXZpbmcgc2V0IHRoYXQgYmFzZWxpbmUsIG15IHF1ZXN0 aW9uIGlzLi4uDQo+ICAgICBROiBXaGF0IGFyZSB0aGUgcHJpdmFjeSBpbXBsaWNhdGlvbnMg b2YgODAyLjExYXogV2ktRmkgUmFuZ2luZz8NCj4gICAgIEE6ID8NCj4gDQo+IC4NClNpbWls YXIgdG8gdGhlIHByaXZhY3kgaW1wbGljYXRpb24gb2YgU2F0ZWxsaXRlIEdQUyAoR2FybWlu IGFuZCBvdGhlcnMpLCANCmFuZCB0aGUgY3VycmVudCBjZWxscGhvbmUgd2l0aCB0aGUgdHJh Y2tpbmcgYXBwIHRoYXQgYWxsb3dzIHlvdSB0byANCmxvY2F0ZSB0aGUgZXhhY3QgcG9zaXRp b24gb2YgYW5vdGhlciBwaG9uZSwgYW5kIHNpbWlsYXIgc3lzdGVtcy4NCg==

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrews@21:1/5 to knuttle on Tue Nov 12 01:05:46 2024
    XPost: comp.mobile.android, alt.internet.wireless

    knuttle wrote on Mon, 11 Nov 2024 17:27:36 -0500 :

    Having set that baseline, my question is...
    Q: What are the privacy implications of 802.11az Wi-Fi Ranging?
    A: ?


    Similar to the privacy implication of Satellite GPS (Garmin and others),
    and the current cellphone with the tracking app that allows you to
    locate the exact position of another phone, and similar systems.

    Remember when Microsoft "_optout_" & Google/Mozilla "_nomap" came out?
    We had to recover from them scooping up our BSSIDs for public databases.

    Billions of people opt-in out of ignorance.
    We don't want to be like those morons.

    We are knowledgeable in computers & routers & phones unlike the hoi polloi.
    So we're private. They're not.

    The reason is we understood the implications of Wi-Fi AP public databases. Therefore, by virtue of our excellent technical knowledge we're not in them.

    Only the unwashed ignorant ill-educated masses are in the public AP databases. But not us.

    When Google vacuumed up the unique BSSID/GPS location of the hoi polloi... Google did NOT get our home router access point in that database.

    Because we're not stupid.
    We learned the privacy implications and we put countermeasures in place.

    Only the ignorant are in Google's public Wi-Fi access point database.
    Apple's too. Mozilla too. And Microsoft. Who knows how many others (WiGle).

    But we intelligentsia are NOT in those public privacy-invading databases.
    Why not?

    Because we put measures in place to prevent being uploaded to them.
    That's why.

    Same situation here.
    We will need to better understand 802.11az in order to protect our privacy.

    Much like we must hide our home router broadcast packets for privacy, there may very well be something we need to do for privacy against Wi-Fi Ranging.

    Because of bluetooth trackers in department stores, I habitually turn off my bluetooth, near field & location radios as I get out of the parked car.

    In that case, the privacy implication is nearly zero.
    All you have to do is turn off your bluetooth radio to remain private.

    Right?

    Actually, I put the phone on airplane mode, but that's the same thing with respect to bluetooth radios - which why I ask about 802.11az Wi-Fi Ranging.

    Q: What should we do on our phones & routers to avoid 802.11az tracking?
    A: ?
    --
    Note every time I mention hiding the broadcast packet for privacy, someone jumps in & says it's not for security. Privacy is different from security.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrews@21:1/5 to Roger on Tue Nov 12 01:42:53 2024
    XPost: comp.mobile.android, alt.internet.wireless

    Roger wrote on Mon, 11 Nov 2024 22:17:24 +0000 :

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
    with FTM measures the time-of-flight (ToF) between an RF packet
    sent from your phone to several nearby APs. While Wi-Fi RTT with
    FTM worked over both the standard 2.4 & 5GHz bands, it was never
    widely deployed in the field, so you¢ve probably never used it

    This may be a silly question but why would a phone be sending
    anything to APs that it doesn't know and therefore cannot use?

    Good question.

    I do not know the answer to that specific question, which is a valid
    question, but I can't answer it directly - but - I can respond with the knowledge that most people's phones *do* send access point data to the unique-access-point-BSSID/GPS and very public databases - that the phone itself, "doesn't know and therefore cannot use".

    Mine doesn't do that because I'm not stupid.
    But most people are stupid.

    Their phones dutifully hoover up every access point in range & sends the AP unique BSSID & unique GPS location to Google's public online databases.

    These phones "don't know the AP and therefore can't use them".
    But Google can.

    Which is why intelligent people protect their access point from hoovering.
    And polite people set up their phone to *not* hoover that AP information.

    But it takes care & knowledge to know what to do in order not to be rude to every person whose house you drive by that is openly broadcasting an SSID.

    That technical knowledge is what this question is trying to discover.

    Q: What do we need to do to protect ourselves from 802.11az Wi-Fi Ranging?
    A: ?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Wolf Greenblatt@21:1/5 to Roger on Mon Nov 11 21:00:32 2024
    XPost: comp.mobile.android, alt.internet.wireless

    On Mon, 11 Nov 2024 22:17:24 +0000, Roger wrote:

    On Mon, 11 Nov 2024 16:19:28 -0000 (UTC), Andrews
    <andrews@spam.net> wrote:

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
    with FTM measures the time-of-flight (ToF) between an RF packet
    sent from your phone to several nearby APs. While Wi-Fi RTT with
    FTM worked over both the standard 2.4 & 5GHz bands, it was never
    widely deployed in the field, so you¢ve probably never used it

    This may be a silly question but why would a phone be sending
    anything to APs that it doesn't know and therefore cannot use?

    https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWEMFM

    Indoor positioning technology update (2021)

    Introduction:
    Which is the best indoor positioning technology for mobile apps?

    Indoor positioning technology for smartphones is developing rapidly, driven
    by the demand for indoor mapping, indoor tracking, and real-time location analytics. So we regularly publish tech updates to help you keep up to
    speed with the latest changes. For each technology, the costs need to be balanced against the delivered accuracy. For all the talk about sub-meter accuracy, it's seldom required. For indoor navigation systems, an accuracy
    of a few meters is needed. There are lots of exciting technologies on the horizon. But for 2021 we recommend sticking with a Bluetooth beacon infrastructure, combined with inertial data. This technology provides
    mobile apps with a location accuracy of 2 to 5m. It's quick and cheap to install and configure.

    The great promise of Wi-Fi positioning is that it leverages existing infrastructure. However, iOS doesn't give access to WiFi signal strengths.
    So positioning has to take place on the infrastructure, not the phone. And
    this means there's no access to inertial information. This greatly limits
    the accuracy that WiFi signal strength positioning can achieve. If
    802.11mc (RTT) or 8.2.11az reach mass adoption,this could all change. These technologies use time of flight ranging instead of signal strength, making
    them much more accurate. Inertial information is still helpful,but it's not
    so important. So WiFi-based location may become a more attractive
    technology. For 2021, these technologies aren't yet viable, mainly because
    iOS doesn't support RTT.

    Currently the best balance between cost and performance. Installation is needed. But the beacons are low-cost and battery-powered,with battery life measured in months or even years. So both installation and ongoing
    maintenance are minimal. Bluetooth beacons alone don't provide great
    accuracy. But when combined with inertial data, the accuracy is good
    enough for almost every use case.

    Specialist technologies like Angle of Arrival Bluetooth, UWB or ultrasound
    may achieve 1m accuracy. This is impossible using Bluetooth or WiFi. But it comes at a cost. The hardware makes deployment much more expensive and more complex. And it's not yet supported on enough phones.

    Much more accurate indoor positioning can be achieved if the distance
    between anchors and mobile devices is measured with precision. Technology options are increasing, and are starting to become available on
    smartphones. For instance, WiFi RTT times the signal rather than using
    signal strength,and is capable of sub-meter accuracy. It's available now on Android phones.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter@21:1/5 to Roger on Tue Nov 12 04:58:47 2024
    XPost: comp.mobile.android, alt.internet.wireless

    Roger <invalid@invalid.invalid> wrote:

    On Mon, 11 Nov 2024 16:19:28 -0000 (UTC), Andrews
    <andrews@spam.net> wrote:

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
    with FTM measures the time-of-flight (ToF) between an RF packet
    sent from your phone to several nearby APs. While Wi-Fi RTT with
    FTM worked over both the standard 2.4 & 5GHz bands, it was never
    widely deployed in the field, so you¢ve probably never used it

    This may be a silly question but why would a phone be sending
    anything to APs that it doesn't know and therefore cannot use?
    --
    Roger

    https://par.nsf.gov/servlets/purl/10314806
    7 Conclusion In this paper we performed the first privacy analysis of Wi-Fi Fine Timing Measurement (FTM) as defined in IEEE802.11mc. We identified numerous weaknesses allowing a passive observer to recover the distance measured by any client, and consequently perform localization. Furthermore,
    we identified flaws in Wi-Fi FTM MAC address randomization, presented techniques to fingerprint stations with firmware-specific granularity, and identified practical scalability limitations. Altogether, these findings
    allow an adversary to localize and track individual clients. With the need
    for a privacy-preserving positioning system, we presented and evaluated a hyperbolic localization system with meter-level accuracy. Our design hides
    the presence of a client, leverages existing Wi-Fi FTM infrastructure,
    requires no hardware changes, and improves overall scalability. Finally, we discussed countermeasures and privacy recommendations for Wi-Fi FTM and
    Wi-Fi Next Generation Positioning.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to knuttle on Tue Nov 12 08:42:45 2024
    XPost: comp.mobile.android, alt.internet.wireless

    knuttle wrote:

    Andrews wrote:

    What are the privacy implications of 802.11az Wi-Fi Ranging?
    .
    Similar to the privacy implication of Satellite GPS (Garmin and others),
    and the current cellphone with the tracking app that allows you to
    locate the exact position of another phone, and similar systems.

    The phone tracking app doesn't allow you to track my phone unless I
    permit you to ...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From knuttle@21:1/5 to All on Tue Nov 12 07:26:25 2024
    XPost: comp.mobile.android, alt.internet.wireless

    T24gMTEvMTEvMjAyNCA1OjI3IFBNLCBrbnV0dGxlIHdyb3RlOg0KPiBPbiAxMS8xMS8yMDI0 IDExOjE5IEFNLCBBbmRyZXdzIHdyb3RlOg0KPj4gV2hpbGUgSSdtIG9uIEFuZHJvaWQgMTMg KHByb2JhYmx5IGZvciBhIHdoaWxlKSBvbiBteSBHYWxheHkgQTMyLTVHICh3aGljaA0KPj4g aXMgc3RpbGwgZ29pbmcgc3Ryb25nIGFmdGVyIFQtTW9iaWxlIGdhdmUgbWUgYSBidW5jaCBp biAyMDIxIGZvciBmcmVlKSwNCj4+IGFwcGFyZW50bHkgdGhvc2Ugb24gQW5kcm9pZCAxNSBu b3cgaGF2ZSBzb21ldGhpbmcgZGVmaW5lZCBpbiA4MDIuMTFheg0KPj4gd2hpY2ggaXMgYXBw YXJlbnRseSBjYWxsZWQgODAyLjExYXogV2ktRmkgUmFuZ2luZyAod2hpY2ggbmV3LCB0byBt ZSkuDQo+Pg0KPj4gQXBwYXJlbnRseS4uLiA4MDIuMTFheiA4MDIuMTFheiBXaS1GaSBSYW5n aW5nIGlzIGluZG9vciBsb2NhdGlvbiB0ZWNoLg0KPj4gPGh0dHBzOi8vd3d3LmFuZHJvaWRh dXRob3JpdHkuY29tL2FuZHJvaWQtMTUtd2ktZmktcmFuZ2luZy0zNDk4MTI4Lz4NCj4+DQo+ PiAxLiBGb3IgdGhlIG1vc3QgcGFydCwgYXBwcm94aW1hdGUgbG9jYXRpb24gb2YgZGV2aWNl cyB3YXMgcGVyZm9ybWVkDQo+PiDCoMKgwqAgYnkgbWVhc3VyaW5nIHRoZSByZWNlaXZlZCBz aWduYWwgc3RyZW5ndGggKFJTUykgZnJvbSBtdWx0aXBsZSBXaS1GaQ0KPj4gwqDCoMKgIGFj Y2VzcyBwb2ludHMgKEFQcykgd2hpY2ggb2ZmZXJlZCAxMC0xNSBtZXRlciBhY2N1cmFjeSBh dCBiZXN0Lg0KPj4NCj4+IDIuIEFuZHJvaWQgYWRkZWQgc3VwcG9ydCBmb3IgV2ktRmkgUlRU IHdpdGggdGhlIHJlbGVhc2Ugb2YgQW5kcm9pZCA5DQo+PiDCoMKgwqAgaW4gMjAxOCwgYW5k IG1hbnkgbW9iaWxlIGRldmljZXMgdG9kYXkgaGF2ZSBXaS1GaSBjaGlwcyB0aGF0IHN1cHBv cnQNCj4+IMKgwqDCoCB0aGUgcG9zaXRpb25pbmcgdGVjaG5vbG9neS4NCj4+DQo+PiAzLiBU aGUgSUVFRSBTdGFuZGFyZHMgQXNzb2NpYXRpb24gY3JlYXRlZCB0aGUgODAyLjExbWMsIG9y IFdpLUZpIFJvdW5kDQo+PiDCoMKgwqAgVHJpcCBUaW1lIChSVFQpIHN0YW5kYXJkIHRvIGFs bG93IGZvciBtb3JlIHByZWNpc2UgV2ktRmktYmFzZWQNCj4+IMKgwqDCoCBwb3NpdGlvbmlu Zy4gVGhpcyBzdGFuZGFyZCB1c2VzIEZpbmUgVGltaW5nIE1lYXN1cmVtZW50IChGVE0pDQo+ PiDCoMKgwqAgdG8gZW5hYmxlIGxvY2F0aW9uIHRyYWNraW5nIHdpdGggMS0yIG1ldGVyIGFj Y3VyYWN5Lg0KPj4NCj4+IDQuIEluc3RlYWQgb2YgcmVseWluZyBvbiBzaWduYWwgc3RyZW5n dGggbWVhc3VyZW1lbnRzLCBXaS1GaSBSVFQNCj4+IMKgwqDCoCB3aXRoIEZUTSBtZWFzdXJl cyB0aGUgdGltZS1vZi1mbGlnaHQgKFRvRikgYmV0d2VlbiBhbiBSRiBwYWNrZXQNCj4+IMKg wqDCoCBzZW50IGZyb20geW91ciBwaG9uZSB0byBzZXZlcmFsIG5lYXJieSBBUHMuIFdoaWxl IFdpLUZpIFJUVCB3aXRoDQo+PiDCoMKgwqAgRlRNIHdvcmtlZCBvdmVyIGJvdGggdGhlIHN0 YW5kYXJkIDIuNCAmIDVHSHogYmFuZHMsIGl0IHdhcyBuZXZlcg0KPj4gwqDCoMKgIHdpZGVs eSBkZXBsb3llZCBpbiB0aGUgZmllbGQsIHNvIHlvdeKWlGUgcHJvYmFibHkgbmV2ZXIgdXNl ZCBpdA0KPj4NCj4+IDUuIFdoaWxlIFdpLUZpIFJUVCB3aXRoIEZUTSBpcyBhbHJlYWR5IGZh aXJseSBhY2N1cmF0ZSwgdGhlIElFRUUgU0ENCj4+IMKgwqDCoCB3YXMgYWJsZSB0byBpbXBy b3ZlIHVwb24gaXQgZXZlbiBmdXJ0aGVyIHdpdGggdGhlIDgwMi4xMWF6IHN0YW5kYXJkLA0K Pj4gwqDCoMKgIGFsc28ga25vd24gYXMgV2ktRmkgUmFuZ2luZy4gV2ktRmkgUmFuZ2luZyB3 aXRoIEZUTSBhbGxvd3MgZm9yDQo+PiDCoMKgwqAgPDEgbWV0ZXIgYWNjdXJhY3kgKGRvd24g dG8gMC40IG1ldGVyKSwgc28gaXTilKwgZXZlbiBtb3JlIGFjY3VyYXRlDQo+PiDCoMKgwqAg dGhhbiBXaS1GaSBSVFQgd2l0aCBGVE0uIE5vdCBvbmx5IHRoYXQsIGJ1dCBpdCB1c2VzIGRv dWJsZSB0aGUNCj4+IMKgwqDCoCBiYW5kd2lkdGggKDE2ME1oeiB2cy4gODBNSHopLCBzdXBw b3J0cyB0aGUgNkdIeiBiYW5kLCBpcyBzY2FsYWJsZQ0KPj4gwqDCoMKgIHRvIGEgbGFyZ2Ug bnVtYmVyIG9mIGNsaWVudHMsIGlzIG1vcmUgc2VjdXJlIGFuZCBwcm90ZWN0ZWQsDQo+PiDC oMKgwqAgYW5kIHN1cHBvcnRzIGR5bmFtaWMgbWVhc3VyZW1lbnQgcmF0ZXMuDQo+Pg0KPj4g Ni4gODAyLjExYXogV2ktRmkgUmFuZ2luZyBjYW4gb25seSB3b3JrIG9uIEFuZHJvaWQgMTUg ZGV2aWNlcyB3aXRoDQo+PiDCoMKgwqAgV2ktRmkgY2hpcHMgKHN1Y2ggYXMgUXVhbGNvbW3i lKwgRmFzdENvbm5lY3QgNzkwMCBjb25uZWN0aXZpdHkgY2hpcCkNCj4+IMKgwqDCoCB0aGF0 IHN1cHBvcnQgV2ktRmkgUmFuZ2luZyBidXQgV2ktRmkgUmFuZ2luZyBpcyBzbGlnaHRseSBs ZXNzDQo+PiDCoMKgwqAgYWNjdXJhdGUgdGhhbiBVbHRyYSB3aWRlYmFuZCAoVVdCKSBhbmQg Qmx1ZXRvb3RoIENoYW5uZWwgU291bmRpbmcsDQo+PiDCoMKgwqAgYnV0IDgwMi4xMWF6IFdp LUZpIFJhbmdpbmcgaGFzIGJldHRlciByYW5nZSB0aGFuIFVXQiAmIEJUIGhhcy4NCj4+DQo+ PiA3LiBUbyB0YWtlIGFkdmFudGFnZSBvZiA4MDIuMTFheiBXaS1GaSBSYW5naW5nLCBhbnkg V2ktRmkgYWNjZXNzDQo+PiDCoMKgwqAgcG9pbnRzIChBUHMpIHRoYXQgc3VwcG9ydCBXaS1G aSA2IG9yIGxhdGVyIHdpbGwgbGlrZWx5IG5lZWQgdG8NCj4+IMKgwqDCoCBidXJuIGluIGEg ZmlybXdhcmUgdXBkYXRlIHRvIHN1cHBvcnQgODAyLjExYXogbG9jYXRpb24gdHJhY2tpbmcu DQo+Pg0KPj4gSGF2aW5nIHNldCB0aGF0IGJhc2VsaW5lLCBteSBxdWVzdGlvbiBpcy4uLg0K Pj4gwqDCoMKgIFE6IFdoYXQgYXJlIHRoZSBwcml2YWN5IGltcGxpY2F0aW9ucyBvZiA4MDIu MTFheiBXaS1GaSBSYW5naW5nPw0KPj4gwqDCoMKgIEE6ID8NCj4+DQo+PiAuDQo+IFNpbWls YXIgdG8gdGhlIHByaXZhY3kgaW1wbGljYXRpb24gb2YgU2F0ZWxsaXRlIEdQUyAoR2FybWlu IGFuZCBvdGhlcnMpLCANCj4gYW5kIHRoZSBjdXJyZW50IGNlbGxwaG9uZSB3aXRoIHRoZSB0 cmFja2luZyBhcHAgdGhhdCBhbGxvd3MgeW91IHRvIA0KPiBsb2NhdGUgdGhlIGV4YWN0IHBv c2l0aW9uIG9mIGFub3RoZXIgcGhvbmUsIGFuZCBzaW1pbGFyIHN5c3RlbXMuDQpUbyByZXBo cmFzZSB0aGUgYWJvdmUsIGFueSBkZXZpY2UgdGhhdCBlbWl0cyBhIHNpZ25hbCBjYW4gYmUg dHJhY2tlZCBhbmQgDQpsb2NhdGVkIHdpdGggdGhlIHByb3BlciBlcXVpcG1lbnQuDQoNClRo aXMgaGFzIGJlZW4gZ29pbmcgb24gc2luY2UgdGhlIGZpcnN0IGVsZWN0cm9tYWduZXRpYyBz aWduYWxzIHdlcmUgc2VudCANCmludG8gdGhlIGFpci4NCg0KVGhlIG9ubHkgd2hhdCB0aGF0 IHlvdSBjYW4gYXZvaWQgdHJhY2tpbmcgdG8gZmluZCB5b3VyIGxvY2F0aW9uLCBpcyB0byAN CnR1cm4gb2ZmLCAgb3IgZ2V0IHJpZCBvZiBhbGwgZGV2aWNlcyB0aGF0IGVtaXQgYSBzaWdu YWwsIGNlbGwgcGhvbmUsIA0KcGFjZSBtYWtlcnMsICBldGMuDQo=

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrews@21:1/5 to knuttle on Tue Nov 12 13:22:25 2024
    XPost: comp.mobile.android, alt.internet.wireless

    knuttle wrote on Tue, 12 Nov 2024 07:26:25 -0500 :

    To rephrase the above, any device that emits a signal can be tracked and located with the proper equipment.

    This has been going on since the first electromagnetic signals were sent
    into the air.

    The only what that you can avoid tracking to find your location, is to
    turn off, or get rid of all devices that emit a signal, cell phone,
    pace makers, etc.

    We have successfully eliminated being tracked in the Wi-Fi AP databases,
    so why can't we just as successfully avoid 802.11az Wi-Fi Ranging tracking?

    You need to keep the question in perspective since we're NOT talking about being tracked when you're out in the open, sleeping, driving, or hiking.

    We're talking about being tracked to the half-meter level *indoors*. Specifically inside of business establishments (who have a motive).

    All the morons on earth exclaim "We're doomed to be tracked" simply because
    a cell phone, by its very nature, gives out emissions which can be tracked.

    We are not those morons. We are intelligent. We understand technology.

    Which is why this question was being asked *specifically* to better
    understand the privacy implications of the specific 802.11az Wi-Fi Ranging.

    This is *new* technology - never before seen in cellphones.

    We are not morons.
    We're intelligent people.

    I'm not sure yet what the privacy implications are of this new technology.
    But I am sure that giving up and surrendering to it is not my intent.

    Yours shouldn't be either.
    We're not slaves. Slaves give up and accept everything done to them.

    We are not slaves to technology.
    We control it. Not the other way around.

    This question is the first step in controlling this new technology, particularly when used by businesses for half-meter tracking of us.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to knuttle on Tue Nov 12 08:32:57 2024
    XPost: comp.mobile.android, alt.internet.wireless

    On Tue, 11/12/2024 7:26 AM, knuttle wrote:
    On 11/11/2024 5:27 PM, knuttle wrote:
    On 11/11/2024 11:19 AM, Andrews wrote:
    While I'm on Android 13 (probably for a while) on my Galaxy A32-5G (which >>> is still going strong after T-Mobile gave me a bunch in 2021 for free),
    apparently those on Android 15 now have something defined in 802.11az
    which is apparently called 802.11az Wi-Fi Ranging (which new, to me).

    Apparently... 802.11az 802.11az Wi-Fi Ranging is indoor location tech.
    <https://www.androidauthority.com/android-15-wi-fi-ranging-3498128/>

    1. For the most part, approximate location of devices was performed
        by measuring the received signal strength (RSS) from multiple Wi-Fi >>>     access points (APs) which offered 10-15 meter accuracy at best.

    2. Android added support for Wi-Fi RTT with the release of Android 9
        in 2018, and many mobile devices today have Wi-Fi chips that support >>>     the positioning technology.

    3. The IEEE Standards Association created the 802.11mc, or Wi-Fi Round
        Trip Time (RTT) standard to allow for more precise Wi-Fi-based
        positioning. This standard uses Fine Timing Measurement (FTM)
        to enable location tracking with 1-2 meter accuracy.

    4. Instead of relying on signal strength measurements, Wi-Fi RTT
        with FTM measures the time-of-flight (ToF) between an RF packet
        sent from your phone to several nearby APs. While Wi-Fi RTT with
        FTM worked over both the standard 2.4 & 5GHz bands, it was never
        widely deployed in the field, so you▔e probably never used it

    5. While Wi-Fi RTT with FTM is already fairly accurate, the IEEE SA
        was able to improve upon it even further with the 802.11az standard, >>>     also known as Wi-Fi Ranging. Wi-Fi Ranging with FTM allows for
        <1 meter accuracy (down to 0.4 meter), so it┬ even more accurate >>>     than Wi-Fi RTT with FTM. Not only that, but it uses double the
        bandwidth (160Mhz vs. 80MHz), supports the 6GHz band, is scalable >>>     to a large number of clients, is more secure and protected,
        and supports dynamic measurement rates.

    6. 802.11az Wi-Fi Ranging can only work on Android 15 devices with
        Wi-Fi chips (such as Qualcomm┬ FastConnect 7900 connectivity chip) >>>     that support Wi-Fi Ranging but Wi-Fi Ranging is slightly less
        accurate than Ultra wideband (UWB) and Bluetooth Channel Sounding, >>>     but 802.11az Wi-Fi Ranging has better range than UWB & BT has.

    7. To take advantage of 802.11az Wi-Fi Ranging, any Wi-Fi access
        points (APs) that support Wi-Fi 6 or later will likely need to
        burn in a firmware update to support 802.11az location tracking.

    Having set that baseline, my question is...
        Q: What are the privacy implications of 802.11az Wi-Fi Ranging?
        A: ?

    .
    Similar to the privacy implication of Satellite GPS (Garmin and others), and the current cellphone with the tracking app that allows you to locate the exact position of another phone, and similar systems.
    To rephrase the above, any device that emits a signal can be tracked and located with the proper equipment.

    This has been going on since the first electromagnetic signals were sent into the air.

    The only what that you can avoid tracking to find your location, is to turn off, 
    or get rid of all devices that emit a signal, cell phone, pace makers,  etc.

    There are two location directions.

    The police could use tower triangulation, to determine your lat:long.

    The cellphone, for whatever reason, could develop a local coordinate
    (via GPS or GPS+creepy_method), which is now, say, showing on your screen.

    Those are the two measurements. Remote measurement, or local measurement.

    Then you have sharing/leaking of the determination, to another party,
    with or without your permission. And that is part of what complicates
    the matter. Maybe the tower will send you your lat:long, if you ask nicely.
    I don't know if this is a practice, or not.

    As a general security principle, you should not gather and store unique information, unless it has an immediate purpose. If the information store
    is ever compromised and read by the wrong party, that could have consequences. So while protocols could be defacto-enabled to do stupid things (share
    with the tower, exactly where you are), there is also the possibility a
    nation state can access that information without any local persons approval.

    You can stop one of the creepy_methods, by not having "that chip" inside
    your phone. That would be a start. when I see these dry technical descriptions of "how we will measure you to within a micron", there seems to be no next sentence "why we feel we should be doing this". That never seems to enter
    into the cellphone chipset argument. When a cellphone has an accelerometer,
    or it is measuring the electrostatic charge in the air, hardly anybody seems
    to be interested in "why did they put this crap in my phone?".

    Some laptop disk drives have an accelerometer, which is for the
    purpose of retracting the heads, before the drive strikes the ground.
    This gives a measure of protection (the retracted head has a higher
    shock rating than if it rests on the platter surface). In the case of
    that laptop drive then, we declare "this is worth it". If the reading
    never leaves the disk drive housing, then there would not be any
    privacy implications.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrews@21:1/5 to Paul on Tue Nov 12 14:41:08 2024
    XPost: comp.mobile.android, alt.internet.wireless

    Paul wrote on Tue, 12 Nov 2024 08:32:57 -0500 :

    If the reading
    never leaves the disk drive housing, then there would not be any
    privacy implications.

    Hi Paul,

    Most people give up because technology is too hard for them to understand.
    But on this newsgroup, we're savvy enough to control that technology.

    Being technically savvy is a wholly different mindset from being a slave.

    As an example, if I take your sentence above to simply change "reading" to 'BSSID' and "disk drive housing" to "home router", there is a lesson to be learned from that sentence with respect to 802.11az Wi-Fi Ranging privacy.

    Instead of:
    "If the 'reading' never leaves the 'disk drive housing',
    then there would not be any privacy implications."

    Change it to:
    "If the 'BSSID' never leaves the 'home router',
    then there would not be any privacy implications."

    That latter sentence only holds true if you "hide" the BSSID broadcast. Luckily, hiding the broadcast is trivial to do on our home routers.

    Notice we eliminate the privacy implications by doing two simple things:
    a. We understand the technology first and foremost, and then
    b. We implement an avoidance mechanism (instead of just giving up)

    Put into simpler terms
    A. We learn that rude phones upload to Google our BSSID if it's NOT hidden
    B. So we hide our BSSID from those rude phones which do that for Google

    It's really that simple.

    It's the same simple thing I'm seeking the answer to for this thread.
    Q: What can we do to not be tracked indoors by 02.11az Wi-Fi Ranging?
    A: I suspect the answer is as easy as turning off Precise Location
    (but I'm not sure as I don't know much about 02.11az Wi-Fi Ranging).
    --
    Always, when I talk about hiding the broadcast, it's not for security.
    It's for privacy.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to Paul on Tue Nov 12 18:46:50 2024
    XPost: comp.mobile.android, alt.internet.wireless

    Paul <nospam@needed.invalid> wrote:
    [...]

    When a cellphone has an accelerometer,
    or it is measuring the electrostatic charge in the air, hardly anybody seems to be interested in "why did they put this crap in my phone?".

    The accelerometer clearly has its uses ('Auto rotate', fitness/
    sleeping apps, theft protection, etc., etc.).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Andrews on Tue Nov 12 13:32:57 2024
    XPost: comp.mobile.android, alt.internet.wireless

    On 2024-11-12 05:22, Andrews wrote:
    knuttle wrote on Tue, 12 Nov 2024 07:26:25 -0500 :

    To rephrase the above, any device that emits a signal can be tracked and
    located with the proper equipment.

    This has been going on since the first electromagnetic signals were sent
    into the air.

    The only what that you can avoid tracking to find your location, is to
    turn off, or get rid of all devices that emit a signal, cell phone,
    pace makers, etc.

    We have successfully eliminated being tracked in the Wi-Fi AP databases,
    so why can't we just as successfully avoid 802.11az Wi-Fi Ranging tracking?

    You've "succeeded" only because the companies that maintain those
    databases LET YOU succeed.

    And you don't even know WHETHER 802.11az WiFi Range Tracking involves collecting any information FROM your device.


    You need to keep the question in perspective since we're NOT talking about being tracked when you're out in the open, sleeping, driving, or hiking.

    We're talking about being tracked to the half-meter level *indoors*. Specifically inside of business establishments (who have a motive).

    Ummmmm...not necessarily so.

    By analogy, GPS doesn't track YOU. GPS signals allow your GPS-enabled
    device to determine its location. The GPS system doesn't get any
    information about you or your location.


    All the morons on earth exclaim "We're doomed to be tracked" simply because
    a cell phone, by its very nature, gives out emissions which can be tracked.

    We are not those morons. We are intelligent. We understand technology.

    That is certainly not being demonstrated here.


    Which is why this question was being asked *specifically* to better understand the privacy implications of the specific 802.11az Wi-Fi Ranging.

    There aren't any.

    802.11az has your device send packets to access points and uses the
    round trip time...

    ...in combination with the known location of the access points...

    ...to triangulate your position.

    The access points have to expose their locations,


    This is *new* technology - never before seen in cellphones.

    We are not morons.
    We're intelligent people.

    I'm not sure yet what the privacy implications are of this new technology. But I am sure that giving up and surrendering to it is not my intent.

    Yours shouldn't be either.
    We're not slaves. Slaves give up and accept everything done to them.

    We are not slaves to technology.
    We control it. Not the other way around.

    This question is the first step in controlling this new technology, particularly when used by businesses for half-meter tracking of us.

    "The 802.11az standard [1], commonly referred to as next generation
    positioning (NGP), enables a STA to identify its position relative to
    multiple access points (APs)"

    <https://www.mathworks.com/help/wlan/ug/802-11az-indoor-positioning-using-super-resolution-time-of-arrival-estimation.html>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)