THE best surveillance device at this point in time, is the smartphone that the masses fully sponsor in order for corporations and government players to spy them.
With the current sensors crammed into smartphones, data is generated to uniquely identify the device together with its user and the environment independent from location services.
Fingerprinting iPhones
This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors.
We have developed a new type of fingerprinting attack, the calibration fingerprinting attack. Our attack uses data gathered from the accelerometer, gyroscope and magnetometer sensors found in smartphones to construct a globally unique fingerprint. Overall, our attack has the following advantages:Research paper.
* Following our disclosure, Apple has patched this vulnerability in iOS 12.2.
- The attack can be launched by any website you visit or any app you use on a vulnerable device without requiring any explicit confirmation or consent from you.
- The attack takes less than one second to generate a fingerprint.
- The attack can generate a globally unique fingerprint for iOS devices.
- The calibration fingerprint never changes, even after a factory reset.
- The attack provides an effective means to track you as you browse across the web and move between apps on your phone.
No comments:
Post a Comment