Surveilling the Masses with Wi-Fi-Based Positioning Systems

AI-generated keywords: Wi-Fi-based Positioning Systems Apple's WPS privacy threat longitudinal tracking user data

AI-generated Key Points

  • Wi-Fi-based Positioning Systems (WPSes) are commonly used by modern mobile devices for location determination using nearby Wi-Fi access points.
  • Apple's WPS was found to have a significant privacy threat due to exploitation by unprivileged attackers, leading to global geolocation data compilation.
  • Researchers were able to pinpoint over 2 billion BSSIDs globally in a year, enabling longitudinal tracking capabilities.
  • Case studies demonstrated how Apple's WPS could facilitate privacy breaches like tracking devices in conflict zones and during natural disasters.
  • Recommendations were provided to enhance user privacy protections for WPS operators and Wi-Fi access point manufacturers on a large scale.
  • A longitudinal study querying 10 million geolocated BSSIDs daily through Apple's WPS showed that approximately 8% of sampled BSSIDs became unlocatable within a month.
  • Common equipment manufacturers identified in the dataset included TP-Link, Huawei, Vantiva, and Sagemcom among others.
  • The research highlights the risks associated with Wi-Fi-based positioning systems and emphasizes the need for robust privacy measures to protect user data from exploitation.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Erik Rye, Dave Levin

Published at IEEE S&P 2024
License: CC BY 4.0

Abstract: Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world. The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices' movements. While most Wi-Fi access points do not move for long periods of time, many devices -- like compact travel routers -- are specifically designed to be mobile. We present several case studies that demonstrate the types of attacks on privacy that Apple's WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy -- all by remotely geolocating wireless access points. We provide recommendations to WPS operators and Wi-Fi access point manufacturers to enhance the privacy of hundreds of millions of users worldwide. Finally, we detail our efforts at responsibly disclosing this privacy vulnerability, and outline some mitigations that Apple and Wi-Fi access point manufacturers have implemented both independently and as a result of our work.

Submitted to arXiv on 23 May. 2024

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2405.14975v1

Wi-Fi-based Positioning Systems (WPSes) are commonly used by modern mobile devices to determine their location using nearby Wi-Fi access points as reference points. However, a study has revealed that Apple's WPS can be exploited to pose a significant privacy threat on a global scale. By conducting an attack, unprivileged attackers were able to compile a comprehensive snapshot of Wi-Fi BSSID geolocations worldwide in just a matter of days. This was achieved by taking advantage of the limited dense regions of allocated MAC address space. Over the course of a year, researchers were able to pinpoint the precise locations of over 2 billion BSSIDs globally. The implications of such vast datasets become more concerning when considering longitudinal tracking capabilities, allowing for the monitoring of device movements over time. While most Wi-Fi access points remain stationary for extended periods, certain devices like compact travel routers are designed for mobility. Several case studies showcased how Apple's WPS could enable privacy breaches, such as tracking devices entering and exiting conflict zones like Ukraine and Gaza, monitoring movements during natural disasters like the fires in Maui, and potentially enabling targeted individual tracking through proxy methods. Recommendations were provided to WPS operators and Wi-Fi access point manufacturers to enhance user privacy protections on a massive scale. To further understand the movement patterns of wireless access points, a month-long longitudinal study was conducted by querying 10 million geolocated BSSIDs daily through Apple's WPS. The study revealed that approximately 8% of sampled BSSIDs became unlocatable within the month, likely due to devices being turned off or moved out of range. Analysis also identified common equipment manufacturers in the dataset, with TP-Link, Huawei, Vantiva, and Sagemcom being among the most prevalent vendors observed. Overall, this research sheds light on the potential risks associated with utilizing Wi-Fi-based positioning systems and underscores the importance of implementing robust privacy measures to safeguard user data from exploitation. Efforts have been made towards responsibly disclosing these vulnerabilities and implementing mitigations by Apple and Wi-Fi access point manufacturers in response to these findings.
Created on 29 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.