Disposable identities: Solving web tracking

JB Abdo, S Zeadally - Journal of Information Security and Applications, 2024 - Elsevier
Interrupting the web tracking kill chain is enough to disrupt the tracker's ability to leverage
the collected information; however, this may disrupt the personalized services enjoyed by …

I Tag, You Tag, Everybody Tags!

H Ibrahim, R Asim, M Varvello, Y Zaki - Proceedings of the 2023 ACM on …, 2023 - dl.acm.org
Location tags are designed to track personal belongings. Nevertheless, there has been
anecdotal evidence that location tags are also misused to stalk people. Tracking is achieved …

Stop Following Me! Evaluating the Malicious Uses of Personal Item Tracking Devices and Their Anti-Stalking Features

KI Turk, A Hutchings - Proceedings of the 2024 European Symposium on …, 2024 - dl.acm.org
Personal item tracking devices are popular for locating lost items such as keys, wallets, and
suitcases. Originally created to help users find personal items quickly, these devices are …

Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags

H Alamleh, M Gogarty, D Ruddell… - arXiv preprint arXiv …, 2024 - arxiv.org
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy
(BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung …

Disposable identities:: Solving web tracking

J Bou Abdo, S Zeadally - 2024 - dl.acm.org
Interrupting the web tracking kill chain is enough to disrupt the tracker's ability to leverage
the collected information; however, this may disrupt the personalized services enjoyed by …

Privacy Attacks and Defenses in the IoT and Mobile Ecosystems

N Shafqat - 2024 - search.proquest.com
Smart technologies undeniably improve efficiency and convenience but also introduce
substantial privacy challenges. This thesis scrutinizes the privacy threats inherent in the …

[PDF][PDF] Poster: Will our Colleagues Detect the AirTag? Let's Check (Consensually).

D Gerhardt, CH Center, M Fassl, K Krombholz - usenix.org
Since their release, AirTags have been misused for stalking and other malicious purposes
[2, 5, 9]. Their small size, affordability, availability, and precise tracking functionality facilitate …