OSINT via Bluetooth: how Android devices give away the owner For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices. Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls. Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets. Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence. These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone. Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases. Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user. What is visible via Bluetooth – Device name – Signal strength (RSSI) — allows you to estimate the distance to the source – Manufacturer-specific data — additional fields specified by the manufacturer – Advertising UUID — often static for specific models – Frequency of broadcasting and interaction with services The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air. Why Android makes more noise than other OS – The MAC address may not be randomized until Bluetooth is manually rebooted - Built–in BLE Privacy protection is either missing or partially implemented – Device names are often transmitted in clear text – System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible. How to reduce visibility 1. Disable Bluetooth if it is not necessary to operate it 2. Disable background scanning:    Settings → Geolocation → Scan → Bluetooth Scan → Off 3. Change the device name:    Settings → About the phone → Device Name 4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services 5. If root access is available, use additional utilities: – Magisk BLE Privacy Module    – XPrivacyLua    – Bluetooth MAC Spoofer Tools for analysis – nRF Connect — displays BLE packets transmitted over the air - Beacon Scanner / BLE Hero – detection and tracking of surrounding devices — btmon with ADB – allows you to view HCI logs, including BLE, without root access - Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, BLE) Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
GM Your art needs to come from your soul before it pierces through others. Be fearless. Fear will defeat you before AI
Over 20 Crypto Phishing Applications Found on the Play Store Stealing Mnemonic Phrases
No internet required 😂
Android was once a haven for tech-savvy users, but now it's overly restrictive. When you unlock the bootloader, apps malfunction, features disappear, and you're regarded as if you're engaging with malware. This isn't improving security; it's poor engineering and unfriendly user policies. The user experience deteriorates annually, plagued by bloatware, ads, faulty updates, with no solution in sight. If you attempt rooting or unlocking the bootloader, you're penalized. We aren't treated as users, but rather as sources of income confined within locked hardware. Manufacturers are unable to deliver functional software and they’ve stopped pretending to care
#Bitcoin could be "banned" in the European Union The European Union could outlaw Bitcoin if data on the blockchain, such as public keys, is considered personal data under the General Data Protection Regulation (GDPR). The European Data Protection Board (EDPB) proposes that this data should be deletable, something that is technically impossible due to the immutability of blockchain. This requirement could lead to the deletion of the entire blockchain, which would mean the end of legal use of Bitcoin in Europe. The proposal also considers that anonymizing transactions is not sufficient, and that some could be classified as high-risk or criminal. The EDPB insists that "technical impossibility" does not exempt from compliance with the GDPR.
Asked four different AIs to name a random number between 1 and 25. ChatGPT — 17 Claude — 17 Grok — 17 Gemini — 17 LLMs don't generate randomness, they predict what a person would answer. And it turns out that for some reason people often name exactly 17. If you use AI without customization and your own data, you get exactly what everyone else gets Same model -> same answers The real benefit is when you contribute something of your own: drafts, tasks, correspondence, thoughts, etc. When a model knows how you think, what is important to you, how you write and what decisions you make, she stops being just an assistant and becomes an extension of your head. Otherwise, it's just a general template in a pretty wrapper.
Anyone who wants to destroy the privacy of others generally feels like they have the most to hide. "The thief believes that everyone is like him."
900,000 blocks!
People think SimpleX Chat is secure. It's not. Truly decentralized services aren't able to moderate anything via a central authority, but SimpleX outright states they do exactly that via their centralized servers that they describe in "how it works" docs as a sort of "data pipe" that just relays data without examining it, yet they explicitly say they can and DO block files from being sent. ALL CENTRALIZED SERVICES ARE ABSOLUTELY CONTROLLED BY SOMEONE AND OPEN TO ANYONE WHO CAN BUST IN THE DOORS. There are no exceptions. - Jody Bruchon