<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-threat-model-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title>DULT Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-threat-model-02"/>
    <author fullname="Maggie Delano">
      <organization>Swarthmore College</organization>
      <address>
        <email>mdelano1@swarthmore.edu</email>
      </address>
    </author>
    <author fullname="Jessie Lowell">
      <organization>National Network to End Domestic Violence</organization>
      <address>
        <email>jlowell@nnedv.org</email>
      </address>
    </author>
    <author fullname="Shailesh Prabhu">
      <organization>Nokia</organization>
      <address>
        <email>shailesh.prabhu@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="06"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>detecting unwanted location trackers</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 46?>

<t>Lightweight location tracking tags are in wide use to allow users to locate items. These tags function as a component of a crowdsourced tracking network in which devices belonging to other network users (e.g., phones) report which tags they see and their location, thus allowing the owner(s) of the tag to determine where their tag was most recently seen. While there are many legitimate uses of these tags, they are also susceptible to misuse for the purpose of stalking and abuse. A protocol that allows others to detect unwanted location trackers must incorporate an understanding of the unwanted tracking landscape today. This document provides a threat analysis for this purpose, including a taxonomy of unwanted tracking and potential attacks against detection of unwanted location tracking (DULT) protocols. The document defines what is in and out of scope for the unwanted location tracking protocols, and provides design requirements, constraints, and considerations for implementation of protocols to detect unwanted location tracking.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/threat-model/draft-ietf-dult-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/draft-ietf-dult-threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Location tracking tags are devices that allow users to locate items. These tags function as a component of a crowdsourced tracking network in which devices belonging to other network users (e.g., phones) report on the location of tags they have seen. At a high level, this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("accessories") transmit an advertisement payload containing accessory-specific information. The payload indicates whether the accessory is separated from its owner(s) and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("non-owner devices") observe those payloads and if the payload is in a separated mode, reports its location to some central service.</t>
        </li>
        <li>
          <t>The owner(s) queries the central service for the location of their accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes both a tag's user and anyone who might be targeted for location tracking by a tag's user, to considerable privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If accessories simply have a fixed identifier that is reported back to the tracking network, then the central server is able to track any accessory without the user's assistance, which is clearly undesirable.</t>
        </li>
        <li>
          <t>Any attacker who can guess a tag ID can query the central server for its location.</t>
        </li>
        <li>
          <t>An attacker can surreptitiously plant an accessory on a target and thus track them by tracking their "own" accessory.</t>
        </li>
        <li>
          <t>Attackers could launch Denial-of-Service (DoS) attacks by flooding the tracking service with spoofed tag reports, disrupting real updates and overwhelming the central server.</t>
        </li>
        <li>
          <t>Frequent co-location of multiple tags enables the central server or a passive observer to infer social relationships, routines, or group behaviors, compromising user privacy without consent.</t>
        </li>
      </ul>
      <t>While location tracking tags have existed for over a decade, they became especially widely-used in the Global North in the last several years as crowdsourced networks were deployed by major smart phone manufacturers. However, due to their reliance on a high density of non-owner devices for the network to be effective and the relative cost of location tracking tags, location tracker use in the Global South is typically limited to affluent communities. If the cost of non-owner devices and location tracking tags decrease, an uptick of unwanted location tracking could also occur in contexts where it is currently infeasible.</t>
      <t>Detecting unwanted location tracking is currently left to individual tracking tag manufacturers and software on non-owner devices. Each manufacturer and smartphone operating system has different implementations to prevent unwanted location tracking, which may or may not be compatible with other manufacturers or operating systems. The goal of the IETF Detecting Unwanted Location Tracking (DULT) working group is to standardize a protocol between location tracking tags and non-owner devices.</t>
      <t>In order to standardize a protocol for detecting unwanted location tracking, thus minimizing the privacy risks described above, it is necessary to analyze and be able to model different privacy threats. This document includes: 1) a taxonomy of unwanted location tracking, 2) methods attackers could use to circumvent unwanted location tracking protocols, and 3) design considerations for implementing unwanted location tracking protocols. The taxonomy of unwanted location tracking uses a flexible framework to provide analysis and modeling of different threat actors, as well as models of potential victims based on their threat context. It defines how these attacker and victim persona models can be combined into threat models. The section on methods to circumvent detection of unwanted location tracking includes a threat matrix and description of several different possible attack vectors. Finally, the design considerations section focuses on specific requirements and constraints for successfully detecting unwanted location tracking, alerting users, and providing guidance on disabling trackers (if desired). This threat model document is intended to inform the work of the implementation of the DULT protocol as described in <xref target="I-D.draft-ietf-dult-accessory-protocol"/> and <xref target="I-D.draft-ietf-dult-finding"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="definitions">
        <name>Definitions</name>
        <ul spacing="normal">
          <li>
            <t><strong>active scanning</strong>: a search for location trackers manually initiated by a user</t>
          </li>
          <li>
            <t><strong>passive scanning</strong>: a search for location trackers running in the background, often accompanied by notifications for the user</t>
          </li>
          <li>
            <t><strong>tracking tag</strong>: a small device that is not easily discoverable and transmits location data to other devices.</t>
          </li>
          <li>
            <t><strong>easily discoverable</strong>: a device that is larger than 30 cm in at least one dimension, larger than 18 cm x 13 xm in two of its dimensions, and/or larger than 250 cm<sup>3</sup> in three-dimensional space</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incorporation of this threat analysis into the DULT protocol does not introduce any security risks not already inherent in the underlying Bluetooth tracking tag protocols. Existing attempts to prevent unwanted tracking by the owner(s) of a tag have been criticized as potentially making it easier to engage in unwanted tracking of the owner(s) of a tag. However, Beck et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding.</t>
      <section anchor="attacker-access-to-victim-account">
        <name>Attacker access to victim account</name>
        <t>In a situation involving interpersonal control, an attacker may have access to a victim's tracking account (e.g. Apple FindMy). The attacker could have physical access to a mobile device on which a tracking account app is installed, remote access through a web portal, or both.</t>
        <t>The risk of an attacker accessing a victim's tracking account remotely can be mitigated, though not eliminated, through support for different forms of multi-factor authentication (including hardware keys, e.g. Yubikeys, as well as more traditional methods). While this can also be used to mitigate the risk posed by physical access, taking overt security measures while frequently in physical proximity to the attacker may lead to the attacker escalating their tactics of interpersonal control. Risk assessments and the weighing of tradeoffs in such situations are often highly individualized.</t>
        <t>The ability of a user to access a tracking account over a web portal illustrates the need to consider web app security as part of support for detecting unwanted location trackers.</t>
      </section>
      <section anchor="taxonomy-of-unwanted-tracking">
        <name>Taxonomy of unwanted tracking</name>
        <t>To create a taxonomy of threat actors, we can borrow from Dev et al.’s <eref target="https://dl.acm.org/doi/fullHtml/10.1145/3544548.3581484">Models of Applied Privacy (MAP) framework</eref>. This framework is intended for organizations and includes organizational threats and taxonomies of potential privacy harms. Therefore, it cannot be applied wholesale. However, its flexibility, general approach to personas, and other elements, are applicable or can be modified to fit the DULT context.</t>
        <t>The characteristics of threat actors may be described as follows. This is not intended to be a full and definitive taxonomy, but an example of how existing persona modeling concepts can be applied and modified.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The attacker works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The attacker does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Proximity to victim
            </t>
            <ul spacing="normal">
              <li>
                <t>High: Lives with victim or has easy physical access to victim and/or victim’s possessions.</t>
              </li>
              <li>
                <t>Medium: Has some physical access to the person and possessions of someone who lives with victim, such as when the attacker and victim are co-parenting a child.</t>
              </li>
              <li>
                <t>Low: Does not live with or have physical access to victim and/or victim’s possessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The attacker has access to resources that may amplify the impact of other characteristics. These could include, but are not limited to, funds (or control over “shared” funds), persons assisting them in stalking behavior, or employment that provides privileged access to technology or individuals’ personal information.</t>
              </li>
              <li>
                <t>Low: The attacker has access to few or no such resources.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In addition, the victim also has characteristics which influence the threat analysis. As with attacker characteristics, these are not intended as a definitive taxonomy.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The victim works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The victim does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Expectation of unwanted tracking
            </t>
            <ul spacing="normal">
              <li>
                <t>Suspecting: The victim has reason to believe that unwanted tracking is a likely risk.</t>
              </li>
              <li>
                <t>Unsuspecting: The victim has no particular reason to be concerned about unwanted tracking.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The victim is generally able to safely access practical and relevant resources. These might include funds to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
              <li>
                <t>Low: The victim is generally unable to safely access practical and relevant resources. These might include money to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to technological safeguards
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The victim is able to safely use, and has access to, technological safeguards such as active scanning apps.</t>
              </li>
              <li>
                <t>Limited: The victim is able to safely use, and has access to, technological safeguards such as active scanning apps, but is unable to use their full capacity.</t>
              </li>
              <li>
                <t>Low: The victim is not able to use technological safeguards such as active scanning apps, due to reasons of safety or access.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>It is also appropriate to define who is using the tracking tags and incorporate this into a model. This is because if protocols overly deprioritize the privacy of tracking tags’ users, an attacker could use a victim’s own tag to track them. Beck et al. describe a <eref target="https://eprint.iacr.org/2023/1332.pdf">possible technological solution</eref> to the problem of user privacy vs privacy of other potential victims. In designing the protocol, these concerns should be weighed equally. TODO: Is this actually how we want to weigh them? This warrants further discussion.</t>
        <ul spacing="normal">
          <li>
            <t>Tracking tag usage
            </t>
            <ul spacing="normal">
              <li>
                <t>Attacker only: The attacker controls one or more tracking tags, but the victim does not.</t>
              </li>
              <li>
                <t>Victim only: The victim controls one or more tracking tags, but the attacker does not.</t>
              </li>
              <li>
                <t>Attacker and victim: Both the attacker and victim control one or more tracking tags.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Any of the threat analyses above could be affected by placement of the tag(s). For instance, a tag could be placed on a victim's person, or in proximity to a victim but not on their person (e.g. a child's backpack). Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>Tag placement
            </t>
            <ul spacing="normal">
              <li>
                <t>Tag on victim's person or immediate belongings. This attack vector allows an attacker to track a victim in a fine-grained way. It is also more likely that this attack would trigger an alert from the tag.</t>
              </li>
              <li>
                <t>Tag(s) in proximity to victim but not on their person (e.g. child's backpack, car). While this is a less fine-grained attack, it may also be less likely to be discovered by the victim. A child may not realize the significance of an alert or know how to check for a tag. A parent may not think to scan for such a tag, or may have more difficulty finding a tag in a complex location such as a car.</t>
              </li>
              <li>
                <t>Tags nearby but not used for unwanted location tracking (e.g. false positives by companions or on transit). While this is not an attack vector in its own right, repeated false positives may discourage a victim from treating alerts seriously.</t>
              </li>
              <li>
                <t>Multiple tags using multiple types of placement. This attack vector may trick a victim into believing that they have fully addressed the attack when they have not. It also allows for a diversity of monitoring types (e.g. monitoring the victim's precise location, monitoring a child's routine, monitoring car usage).</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="example-scenarios-with-analyses-todo-expand-scenarios-to-incorporate-expanded-taxonomy">
          <name>Example scenarios with analyses TODO: expand scenarios to incorporate expanded taxonomy</name>
          <t>The following scenarios are composite cases based upon reports from the field. They are intended to illustrate different angles of the problem. They are not only technological, but meant to provide realistic insights into the constraints of people being targeted through these tags. There is no identifying information for any real person contained within them. In accordance with research on <eref target="https://dl.acm.org/doi/10.1145/2207676.2208573">how designers understand personas</eref>, the characters are given non-human names without attributes such as gender or race.
The analysis of each scenario provides an example usage of the modeling framework described above. It includes a tracking tag usage element for illustrative purposes. However, as discussed previously, this element becomes more or less relevant depending on protocol evolution.
Note that once a given attacker persona has been modeled, it could be recombined with a different victim persona, or vice versa, to model a different scenario. For example, a non-expert victim persona could be combined with both non-expert and expert attacker personas.</t>
          <section anchor="scenario-1">
            <name>Scenario 1</name>
            <section anchor="narrative">
              <name>Narrative</name>
              <t>Mango and Avocado have two young children. Mango, Avocado, and the children all use smartphones, but have no specialized technical knowledge. Mango left because Avocado was abusive. They were homeless for a month, and the children have been living with Avocado. They now have an apartment two towns away. They do not want Avocado to know where it is, but they do want to see the children. They and Avocado meet at a public playground. They get there early so that Avocado will not see which bus route they arrived on and keep playing with the children on the playground until after Avocado leaves, so that Avocado will not see which bus route they get on. Two days later, Avocado shows up at Mango’s door, pounding on the door and shouting.</t>
            </section>
            <section anchor="analysis">
              <name>Analysis</name>
              <t>In this case, the attacker has planted a tag on a child. Co-parenting after separation is common in cases of intimate partner violence where the former partners have a child together. Child visits can be an opportunity to introduce technology for purposes of stalking the victim.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Avocado</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown, but can be presumed higher than Mango’s due to Mango’s recent homelessness</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Normal</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Avocado and Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-2">
            <name>Scenario 2</name>
            <section anchor="narrative-1">
              <name>Narrative</name>
              <t>Strawberry and Elderberry live together. Neither has any specialized technological knowledge. Strawberry has noticed that Elderberry has become excessively jealous – every time they go to visit a friend by themselves, Elderberry accuses them of infidelity. To their alarm, over the last week, on multiple occasions, Elderberry has somehow known which friend they visited at any given time and has started to harass the friends. Strawberry eventually gets a notification that a tracker is traveling with them, and thinks it may be in their car, but they cannot find it. They live in a car-dependent area and cannot visit friends without the car, and Elderberry controls all of the “family” money, so their cannot take the car to the mechanic without Elderberry knowing.</t>
            </section>
            <section anchor="analysis-1">
              <name>Analysis</name>
              <t>Here, the attacker and the victim are still cohabiting, and the attacker is monitoring the victim’s independent activities. This would allow the attacker to know if, for instance, the victim went to a police station or a domestic violence agency. The victim has reason to think that they are being tracked, but they cannot find the device. This can happen if the sound emitted by the device is insufficiently loud, and is particularly a risk in a car, where seat cushions or other typical features of a car may provide sound insulation for a hidden tag. The victim could benefit from having a mechanism to increase the volume of the sound emitted by the tag. Another notable feature of this scenario is that because of the cohabitation, the tag will spend most of the time in “near-owner state” as defined by the proposed industry consortium specification <xref target="I-D.detecting-unwanted-location-trackers"/>. In near-owner state it would not provide alerts under that specification.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Elderberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Impaired (cannot hear alert sound)</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Elderberry and Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-3">
            <name>Scenario 3</name>
            <section anchor="narrative-2">
              <name>Narrative</name>
              <t>Lime and Lemon have been dating for two years. Lemon works for a tech company and often emphasizes how much more they know about technology than Lime, who works at a restaurant. Lemon insists on having access to Lime’s computer and Android phone so that they can “make sure they are working well and that there are no dangerous apps.” Lemon hits Lime when angry and has threatened to out Lime as gay to their conservative parents and report them to Immigration &amp; Customs Enforcement if Lime “talks back.” Lime met with an advocate at a local domestic violence program to talk about going to their shelter once a bed was available. The advocate did some safety planning with Lime, and mentioned that there is an app for Android that can scan for location trackers, but Lime did not feel safe installing this app because Lemon would see it. The next time Lime went to see the advocate, they chose a time when they knew Lemon had to be at work until late to make sure that Lemon did not follow them, but when Lemon got home from work they knew where Lime had been.</t>
            </section>
            <section anchor="analysis-2">
              <name>Analysis</name>
              <t>This is a case involving a high-skill attacker, with a large skill difference between attacker and victim. This situation often arises in regions with a high concentration of technology industry workers. It also may be more common in ethnic-cultural communities with high representation in the technology industry. In this case the victim is also subject to a very high level of control from the attacker due to their imbalances in technological skills and societal status, and is heavily constrained in their options as a result. It is unsafe for the victim to engage in active scanning, or to receive alerts on their phone. The victim might benefit from being able to log into an account on another phone or a computer and view logs of any recent alerts collected through passive scanning.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Lemon</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Victim</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Victim Profile</th>
                    <th align="left">Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Low</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Lemon and Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
        </section>
        <section anchor="bluetooth-vs-other-technologies">
          <name>Bluetooth vs. other technologies</name>
          <t>The above taxonomy and threat analysis focus on location tracking tags. They are protocol-independent; if a tag were designed for crowd-sourced location tracking using a technology other than Bluetooth, they would still apply. The key attributes are the functionalities and physical properties of the accessory from the user’s perspective. The accessory must be small, not easily discoverable, and able to participate in a crowd-sourced location tracking network.</t>
        </section>
      </section>
      <section anchor="possible-attacks-on-the-dult-protocol">
        <name>Possible Attacks on the DULT Protocol</name>
        <t>There are several different ways an attacker could attempt to circumvent the DULT protocol in order to track a victim without their consent or otherwise take advantage of the crowdsourced network. These include deploying multiple tags to follow a single victim, using non-conformant accessories and/or devices, and taking advantage of possible differences between crowdsourced network implementations. This section includes a threat prioritization framework that assesses the risk of these attacks and how these risks may be mitigated.</t>
        <section anchor="threat-prioritization-framework-for-dult-threat-model">
          <name>Threat Prioritization Framework for DULT Threat Model</name>
          <t>Threats in the DULT ecosystem vary in severity, feasibility, and likelihood, affecting users in different ways. Some threats enable long-term tracking, while others exploit gaps in detection mechanisms or leverage non-conformant devices. To assess and prioritize these risks, the following framework classifies threats based on their impact, likelihood, feasibility, affected users, and the availability of mitigations. A Threat Matrix is included that provides a structured assessment of known threats and their associated risks. This categorization helps in understanding the challenges posed by different tracking techniques and their potential mitigations.</t>
        </section>
        <section anchor="threat-matrix">
          <name>Threat Matrix</name>
          <t>To systematically assess the risks associated with different threats, we introduce the following threat matrix. This categorization considers the following factors:</t>
          <ul spacing="normal">
            <li>
              <t>Impact: The potential consequences of the threat if successfully executed.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Minimal effect on privacy and security.</t>
                </li>
                <li>
                  <t>Medium: Moderate effect on user privacy or tracking protection.</t>
                </li>
                <li>
                  <t>High: Severe privacy violations or safety risks.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Likelihood: The probability of encountering this threat in real-world scenarios. This includes both the frequency of the attack and how easy it is to execute.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Rare or requires specific conditions and high technical effort.</t>
                </li>
                <li>
                  <t>Medium: Possible under common scenarios with moderate technical requirements.</t>
                </li>
                <li>
                  <t>High: Frequently occurring or easily executed using common tools or skills.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Risk Level: A qualitative assessment based on impact and likelihood.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Limited risk requiring minimal mitigation.</t>
                </li>
                <li>
                  <t>Medium: Requires mitigation to prevent common attacks.</t>
                </li>
                <li>
                  <t>High: Critical threat must be addressed.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Affected Users: These are categorized as either:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Victims: Individuals specifically targeted or affected by the attack.</t>
                </li>
                <li>
                  <t>All users: Anyone using the system, even if they are not directly targeted.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Mitigation Available?: Whether a known mitigation strategy exists.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Yes: A viable mitigation exists.</t>
                </li>
                <li>
                  <t>Partial: Some mitigations exist, but are not fully effective.</t>
                </li>
                <li>
                  <t>No: No effective mitigation currently available.</t>
                </li>
              </ul>
            </li>
          </ul>
          <table>
            <thead>
              <tr>
                <th align="left">Threat</th>
                <th align="left">Impact</th>
                <th align="left">Likelihood</th>
                <th align="left">Risk Level</th>
                <th align="left">Affected Users</th>
                <th align="left">Mitigation Available?</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Deploying Multiple Tags</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">Full</td>
              </tr>
              <tr>
                <td align="left">Remote Advertisement Monitoring</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Physically Modifying Tags</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Accessory Firmware Modifications</td>
                <td align="left">High</td>
                <td align="left">Low</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Attacker Accessory Disablement</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Tracking Using Victim's Own Tag</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Victim Tag Detection</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Victim Tag</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Tag)</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Tag)</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Network)</td>
                <td align="left">Medium</td>
                <td align="left">Low</td>
                <td align="left">Low</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Replay Attack</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Heterogeneous Tracker Networks</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Victims</td>
                <td align="left">No</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="deploying-multiple-tags">
          <name>Deploying Multiple Tags</name>
          <t>When an attacker deploys tracking tags to follow a victim, they may deploy more than one tag. For example, if planting a tracking tag in a car, the attacker might place one tag inside the car, and another affixed on the outside of the car. The DULT protocol must be robust to this scenario. This means that scans, whether passive or active, need to be able to return more than one result if a device is suspected of being used for unwanted tracking, and the time to do so must not be significantly impeded by the presence of multiple trackers. This also applies to situations where many tags are present, even if they are not being used for unwanted location tracking, such as a busy train station or airport where tag owners may or may not be in proximity to their tracking tags. Instead of distributing multiple tags in the same location, an attacker could also distribute multiple tracking tags across locations frequently visited by a victim (home, workplace, etc.).</t>
          <t>The impact of this attack is medium for typical cases involving a small number of tags, though the impact could escalate if an attacker deploys dozens of tags. The likelihood is high, as deploying multiple tags requires minimal technical effort and can be done using inexpensive, commercially available trackers, making the attack easily repeatable. As a result, the overall risk is high, requiring robust countermeasures. The impact of multiple tags can be fully mitigated by scanning for multiple tags, though a sophisticated attacker might deploy other techniques such as modifying tag firmware (<xref target="accessory-firmware-modifications"/>) or periodically disabling a tag (<xref target="attacker-accessory-disablement"/>) to evade detection.</t>
        </section>
        <section anchor="remote-advertisement-monitoring">
          <name>Remote Advertisement Monitoring</name>
          <t>Any device with Bluetooth scanning capabilities in proximity to a location tracking tag can receive Bluetooth advertisement packets. If an attacker is able to link an identifier in an advertisement packet to a particular tag, they may be able to use this information to track the tag over time, and by proxy the victim or other individual, without their consent.</t>
          <t>The impact of remote advertisement monitoring is moderate, as tracking generally compromises privacy but, in many cases, prolonged observation primarily reveals the location of the object rather than of the person. The likelihood is high, as attackers can execute this using off-the-shelf Bluetooth scanning tools or smartphone apps with minimal technical knowledge. As a result, this is classified as a medium risk attack. This attack can be partially mitigated by rotating tracking identifiers.</t>
          <t>Tracking tags typically rotate any identifiers associated with the tag, with the interval depending on context: when near the owner's device, identifiers rotate frequently (every 15–30 minutes), while in a separated state, rotation may occur only once every 24 hours (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Beck et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that would reduce this to 60 seconds. However, work must investigate how robust this scheme is to the presence of multiple tags (see <xref target="deploying-multiple-tags"/>).</t>
          <t>While rotating identifiers provides partial mitigation, attackers can still use advanced correlation techniques, such as signal fingerprinting, timing analysis, and multi-sensor triangulation, to bypass this defense. These methods leverage unique transmission characteristics, RSSI (Received Signal Strength Indicator) variations, and environmental factors to probabilistically link rotating identifiers back to a single device over time. Prior research, such as Beck et al., has <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> how statistical models can be used to correlate Bluetooth signals even when identifiers change frequently. Additional work by Despres et al. further <eref target="https://people.eecs.berkeley.edu/~daw/papers/detagtive-snip23.pdf">demonstrates</eref> that BLE devices using rotating identifiers can be deanonymized through RSSI-based correlation techniques.</t>
        </section>
        <section anchor="physically-modifying-tags">
          <name>Physically Modifying Tags</name>
          <t>An attacker might physically modify a tag in ways that make it non-conformant with the DULT protocol. Physical modifications may include disabling a speaker or other haptics, or shielding and altering the antenna to reduce transmission range. These modifications can make it more difficult for victims to discover hidden trackers, leading to a high impact.</t>
          <t>The likelihood is medium, as such hardware modifications require moderate technical expertise and physical access to the device.  Given this combination of factors, the overall risk level is medium. Partial mitigation is available, such as monitoring the impedance of the speaker, but these mitigations are limited as attackers have physical access to the tags.</t>
        </section>
        <section anchor="accessory-firmware-modifications">
          <name>Accessory Firmware Modifications</name>
          <t>The DULT protocol (see <xref target="I-D.draft-ietf-dult-accessory-protocol"/>) will specify that accessory firmware images <bcp14>MUST</bcp14> be authenticated, and that accessories <bcp14>MUST</bcp14> verify the integrity and origin of firmware. However, if these protections were to be bypassed, an accessory's firmware could be altered to deviate from standard behavior. Attackers may manipulate advertisement intervals to reduce detection opportunities, allowing the tag to evade tracking for extended periods, or rotate IDs rapidly, disrupting detection systems that rely on tracking unknown device persistence.</t>
          <t>Firmware-based changes would have high impact. The likelihood is low, as these attacks require significant technical expertise to bypass firmware verification and modify low-level accessory behavior. As a result, the overall risk level is medium. Partial mitigation of this attack is possible by requiring accessories to verify the integrity and origin of firmware.</t>
        </section>
        <section anchor="attacker-accessory-disablement">
          <name>Attacker Accessory Disablement</name>
          <t>An attacker might intentionally disable their location tracking tag to make it harder for a victim to detect and/or locate the tag. This could be done periodically or permanently and either remotely or using a <eref target="https://undetectag.com/products/undetectag">physical device</eref>.</t>
          <t>The likelihood is medium, as this attack is relatively easy to perform using commercially available tools, but it still requires some attacker awareness of the victim’s actions (e.g., an ongoing search). The impact is medium as the tag can still be detected and physically located, though it may be more difficult to do so. The risk level is medium. The impact of this attack can be partially mitigated by minimizing the time needed to detect unwanted location tracking and maintaining the same identifier on reset.</t>
        </section>
        <section anchor="tracking-using-victims-own-tag">
          <name>Tracking Using Victim's Own Tag</name>
          <t>Attackers with access to a victim’s account, either through password reuse, phishing, social engineering, or credential theft, can exploit DULT’s ownership model by using the victim’s own tracker to monitor their location. Since the tracker is registered to the victim, the system assumes the user is the legitimate owner and suppresses any unwanted tracking alerts. This creates a significant blind spot, as the victim is effectively tracked by their own device without any warning.</t>
          <t>This threat differs from impersonation or replay attacks (see <xref target="impersonation-attack-tag"/> and <xref target="replay-attack"/>) because it does not rely on breaking cryptographic protections or evading detection algorithms. Instead, it leverages the legitimate trust relationship encoded in the protocol. The impact of this attack is high, as it results in silent tracking with no alert mechanism. The likelihood is medium, as account compromise is a relatively common occurrence in real-world settings, though it still requires some attacker effort or opportunity. Overall, the risk level is high due to the complete circumvention of core notification systems.</t>
          <t>Partial mitigation may be possible through account activity monitoring, anomaly detection (e.g., login from unfamiliar location or device), and notifications of significant account events (such as tag access or tag movement linked to a different device). However, these features depend on platform implementation and may not be uniformly enforced.</t>
        </section>
        <section anchor="disabling-victim-tag-detection">
          <name>Disabling Victim Tag Detection</name>
          <t>An attacker might intentionally disable passive unwanted location tracking detection on a victim's device. The impact of this attack is high as it would prevent the victim from being notified about possible unwanted location tracking.</t>
          <t>The likelihood is medium, as executing this attack requires the attacker to physically or remotely alter settings on the victim’s device, which involves moderate effort and access. The risk level is high. This attack can be partially mitigated by notifying victims of potential location tracking using other means e.g. sounds or haptics on location tracking tags.</t>
        </section>
        <section anchor="disabling-victim-tag">
          <name>Disabling Victim Tag</name>
          <t>An attacker might intentionally disable a victim's tag as a form of harassment. This could be done with physical access to the tag, using a victim's own device to disable the tag, or with remote access to disable the tag via the crowdsourced network. The impact of this attack is medium as it is a nuisance but most likely does not involve a security threat, unless the tag is being used to track a valuable item or child. The likelihood is medium, as executing the attack requires access to the victim’s tag, device, or account, which involves a moderate level of access or effort. The risk level is therefore medium. Physical disablement of a tag cannot be mitigated, but other forms of disablement may be mitigated by notifying users that a change has been made on their account, similar to suspicious login notifications.</t>
        </section>
        <section anchor="impersonation-attack-tag">
          <name>Impersonation Attack (Tag)</name>
          <t>Attackers might be able to impersonate legitimate tracking accessories, enabling tracking without complying with the DULT protocol. This can be done by <eref target="https://www.hackster.io/news/fabian-braunlein-s-esp32-powered-find-you-tag-bypasses-apple-s-airtag-anti-stalking-protections-0f2c9ee7da74">deploying custom tags</eref> or by using <eref target="https://cec.gmu.edu/news/2025-02/find-my-hacker-how-apples-network-can-be-potential-tracking-tool">devices to mimic tags</eref>. By impersonating an authorized tag, an attacker could inject false location data, misattribute tag ownership, or evade detection by appearing as a trusted accessory or rotating identifiers frequently. This tactic increases the difficulty of accurately identifying unauthorized tracking attempts and undermines the reliability of the network.</t>
          <t>In addition to full impersonation, adversaries may exploit platform-specific assumptions to suppress alerts. For instance, Chen et al. <eref target="https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-1266-chen-junming.pdf">describe</eref> a technique in which an attacker sets the status field of a broadcast message to 0x00 to emulate MacBook location beacons. Since such beacons are typically ignored by Apple’s unwanted tracking alerts, this evasion method allows the attacker to remain undetected. This demonstrates how attackers can exploit trust assumptions about certain device classes to bypass user protections, further complicating detection and mitigation.</t>
          <t>The impact of this attack is high, as it enables real-time location tracking by exploiting the behavior of crowdsourced location networks. The likelihood is medium, as the attack requires deploying custom hardware or exploiting platform-specific capabilities like unrestricted Bluetooth broadcasting, which have been demonstrated in research but remain moderately complex to execute. As a result, the overall risk level is considered high. Currently, no fully effective mitigation exists. However, improvements in authentication mechanisms, such as cryptographic signing of broadcasts, and anomaly detection techniques may help reduce the risk.Protocol-level authentication is needed to validate tracker identities and prevent these attacks. Operating systems can partially mitigate software impersonation attacks by restricting low-level BLE broadcasting unless elevated privileges are granted.</t>
        </section>
        <section anchor="impersonation-attack-device">
          <name>Impersonation Attack (Device)</name>
          <t>In addition to impersonating a tag, an attacker could also impersonate a device. This affords attacks against both tracking accessories and against the crowdsourced network.</t>
          <section anchor="attacks-on-accessories">
            <name>Attacks on accessories</name>
            <t>An impersonated device could send commands to accessories, such as a "play sound" command or a remote disablement command. Accessory firmware should either attempt to verify the authenticity of commands from devices or otherwise limit how accessories respond to commands from devices. For example, accessories that receive a "play sound" command should only execute the command if the accessory is away from its owner. Similarly, accessories should only respond to remote disablement commands if the accessory can reasonably be expected to be used for unwanted location tracking and the accessory can confirm that a device has used other finding techniques to locate the device.  (TODO remote disablement requirements section)</t>
            <t>The impact of a device impersonation attack is high if it is able to send arbitrary commands to accessories. The likelihood of such an attack is medium as it can be done by any device able to transmit BTLE packets but requires some familiarity with the DULT protocol. Therefore, the overall risk level is high. The affected users are all users. Mitigation is partial; while devices cannot be prevented from transmitting packets, certain rules can be enforced by accessories.</t>
          </section>
          <section anchor="attacks-on-crowdsourced-network">
            <name>Attacks on crowdsourced network</name>
            <t>An impersonated device could send false location reports to the crowdsourced network, or selectively not report to the crowdsourced network.</t>
            <t>The likelihood of this attack is low, as it would require the impersonated device to authenticate with the crowdsourced network. The impact is medium, as not reporting would have no impact and false location reports are a nuisance but can be mitigated. The overall risk level for this attack is low. The affected users are all users.  Mitigations include requiring authentication to send reports to the crowdsourced network and only trusting reports when they can be verified by multiple devices.</t>
          </section>
        </section>
        <section anchor="replay-attack">
          <name>Replay Attack</name>
          <t>In addition to impersonating legitimate tracking devices (see <xref target="impersonation-attack-tag"/>), attackers can record and replay Bluetooth advertisements from a legitimate tracker. For example, an attacker could capture a tracker's broadcast and retransmit it elsewhere, creating confusion about its actual location. This could be used to mislead users, interfere with tracking accuracy, or frame an innocent party by making it appear as though they are carrying a tracker when they are not.</t>
          <t>The impact of this attack is medium. The likelihood is high, as replay attacks require no authentication and can be executed using off-the-shelf Bluetooth scanning tools with minimal technical expertise. Replay attacks pose a medium risk owing to their higher likelihood but medium impact. Replay attacks are particularly difficult to mitigate as they may involve different combinations of accessories and devices. Partial mitigation may be possible by authenticating messages from accessories in a time varying manner.</t>
        </section>
        <section anchor="heterogeneous-tracker-networks">
          <name>Heterogeneous Tracker Networks</name>
          <t>Attackers may use a mix of tracking devices from different manufacturers (e.g., Apple AirTags, Tile, Samsung SmartTags) to exploit gaps in vendor-specific tracking protections. Many detection systems are brand-dependent, making them ineffective against mixed tracker deployments. The goal of the DULT protocol is to enable a cross-vendor framework; however, any slight differences in implementation could be exploited.</t>
          <t>The impact is high, as it circumvents traditional defenses. The likelihood is medium, as deploying or selecting from multiple brands requires effort and coordination, and may demand deeper knowledge of platform-specific behaviors and limitations. Overall, this is medium risk attack. This attack can be mitigated by manufacturers adopting the DULT protocol and ensuring that the DULT protocol is sufficiently clear to minimize gaps in vendor-specific tracking protections.</t>
        </section>
      </section>
      <section anchor="what-is-in-scope">
        <name>What is in scope</name>
        <section anchor="technologies">
          <name>Technologies</name>
          <t>The scope of this threat analysis includes any accessory that is small and not easily discoverable and able to transmit its location to other consumer devices. Larger and/or easily discoverable devices such as laptops with tracking tag integrations may also choose to implement the protocol.</t>
        </section>
        <section anchor="attacker-profiles">
          <name>Attacker Profiles</name>
          <t>An attacker who deploys any of the attacks described in <xref target="threat-prioritization-framework-for-dult-threat-model"/> is considered in scope. This includes attempts to track a victim using a tracking tag and applications readily available for end-users (e.g. native tracking application) is in scope. Additonally, an attacker who physically modifies a tracking tag (e.g. to disable a speaker) is in scope. An attacker who makes non-nation-state level alterations to the firmware of an existing tracking tag or creates a custom device that leverages the crowdsourced tracking network is in scope.</t>
        </section>
        <section anchor="victim-profiles">
          <name>Victim Profiles</name>
          <t>All victims profiles are in scope regardless of their expertise, access to resources, or access to technological safeguards. For example, protocols should account for a victim's lack of access to a smartphone, and scenarios in which victims cannot install separate software.</t>
        </section>
      </section>
      <section anchor="what-is-out-of-scope">
        <name>What is out of scope</name>
        <section anchor="technologies-1">
          <name>Technologies</name>
          <t>There are many types of technology that can be used for location tracking. In many cases, the threat analysis would be similar, as the contexts in which potential attackers and victims exist and use the technology are similar. However, it would be infeasible to attempt to describe a threat analysis for each possible technology in this document. We have therefore limited its scope to location-tracking accessories that are small and not easily discoverable and able to transmit their locations to other devices. The following are out of scope for this document:</t>
          <ul spacing="normal">
            <li>
              <t>App-based technologies such as parental monitoring apps.</t>
            </li>
            <li>
              <t>Other Internet of Things (IoT) devices.</t>
            </li>
            <li>
              <t>Connected cars.</t>
            </li>
            <li>
              <t>User accounts for cloud services or social media.</t>
            </li>
          </ul>
        </section>
        <section anchor="victim-profiles-1">
          <name>Victim Profiles</name>
          <t>N/A</t>
        </section>
      </section>
    </section>
    <section anchor="design-considerations">
      <name>Design Considerations</name>
      <t>As discussed in <xref target="security-considerations"/>, unwanted location tracking can involve a variety of attacker, victim, and tracking tag profiles. A successful implementation to preventing unwanted location tracking should:</t>
      <ul spacing="normal">
        <li>
          <t>Include a variety of approaches to address different scenarios, including active and passive scanning and notifications or sounds</t>
        </li>
        <li>
          <t>Account for scenarios in which the attacker has high expertise, proximity, and/or access to resources within the scope defined in <xref target="what-is-in-scope"/> and <xref target="what-is-out-of-scope"/></t>
        </li>
        <li>
          <t>Account for scenarios in which the victim has low expertise, access to resources, and/or access to technological safeguards within the scope defined in <xref target="what-is-in-scope"/> and <xref target="what-is-out-of-scope"/></t>
        </li>
        <li>
          <t>Avoid privacy compromises for the tag owner(s) when protecting against unwanted location tracking using tracking tags</t>
        </li>
      </ul>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The DULT protocol should 1) allow victims to detect unwanted location tracking, 2) help victims find tags that are tracking them while minimizing false positives (e.g., avoiding legitimate, co-owned, or nearby tags being misidentified as threats), and 3) provide instructions for victims to disable those trackers if they choose. These affordances should be implemented while considering the appropriate privacy and security requirements.</t>
        <section anchor="detecting-unwanted-location-tracking">
          <name>Detecting Unwanted Location Tracking</name>
          <t>There are four ways that the DULT protocol should assist victims in detecting potentially unwanted location tracking: 1) active scanning, 2) passive scanning, 3) tracking tag alerts, and 4) crowdsourced network activities logs.</t>
          <section anchor="active-scanning">
            <name>Active Scanning</name>
            <t>There may be scenarios where a victim suspects that they are being tracked without their consent. Active scanning should allow a user to use a native application on their device to search for tracking tags that are separated from their owners. Additional information about when that tag has been previously encountered within a designated time window (e.g. the last 12 hours) should also be included if available (see <xref target="privacy-and-security-requirements-todo"/>). Allowing users to "snooze" or ignore tags known to be safe (e.g. tags from a family member) could also be implemented. Tracking tags that are near their owners should not be shared to avoid abuse of the active scanning feature.</t>
          </section>
          <section anchor="passive-scanning">
            <name>Passive Scanning</name>
            <t>The platform should passively scan for devices suspected of unwanted location tracking and notify the user. This will involve implementing one or more algorithms to use to flag trackers and determine when to notify the user. (A dedicated DULT WG document will address tracking algorithms, and will be linked when it is available.) The user could be notified through a push notification or through Sounds and Haptics (see <xref target="tracking-tag-alerts"/>). When a tag has been identified as potentially being used for unwanted location tracking, the user should be able to view the serial number of the device along with obfuscated owner information (e.g. last four digits of phone number, obfuscated email address) for all accounts linked to the tag and instructions on how to find and/or disable the tag (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>). There will be tradeoffs between detecting potential unwanted location tracking promptly and alerting the potential victim prematurely. One way to handle these tradeoffs is to allow users to set the sensitivity of these alerts. For example, the <eref target="https://github.com/seemoo-lab/AirGuard">AirGuard</eref> app includes three different "Security Level" settings that users can customize.</t>
            <t>To improve the accuracy of unwanted tracking detection, a confidence scoring mechanism can be used. Instead of issuing binary alerts for all detected tracking devices, the system assigns a confidence score based on multiple factors, helping distinguish between genuine tracking threats and benign scenarios.</t>
            <t>This section outlines potential factors that may contribute to assessing the likelihood of unwanted location tracking. Each factor can be considered independently to help inform an overall risk assessment.</t>
            <section anchor="duration-of-proximity">
              <name>Duration of Proximity</name>
              <t>Tracks how long a device remains in close proximity to the user.</t>
              <t><strong>Rationale</strong>: Devices that persist near a user for extended periods are more likely to indicate tracking activity than transient encounters (e.g., passing someone on public transit).</t>
              <section anchor="movement-correlation">
                <name>Movement Correlation</name>
                <t>Measures how closely the movement of the suspected device mirrors that of the user.</t>
                <t><strong>Rationale</strong>: High movement correlation (e.g., appearing at home, then work, then a store with the user) increases the likelihood that the device is following the user intentionally.</t>
              </section>
              <section anchor="signal-strength-trends">
                <name>Signal Strength Trends</name>
                <t>Observes how the signal strength of the suspected device (e.g., Bluetooth RSSI) changes over time.</t>
                <t><strong>Rationale</strong>: A sustained or increasing signal strength suggests physical proximity to the user, strengthening the case for intentional tracking.</t>
              </section>
              <section anchor="persistence">
                <name>Persistence</name>
                <t>Evaluates how often and across how many different times/locations the same device is observed, while accounting for identifier rotation.</t>
                <t><strong>Rationale</strong>: Frequent reappearances over time and space can indicate deliberate placement, even if identifiers change periodically.</t>
              </section>
              <section anchor="hardware-identity">
                <name>Hardware Identity</name>
                <t>Analyzes available Bluetooth advertisement metadata, such as vendor-specific fields or tracker model indicators, while respecting identifier randomization.</t>
                <t><strong>Rationale</strong>: Certain devices (e.g., known commercial trackers) are more likely to be associated with tracking. Even with rotating identifiers, consistent vendor metadata or other characteristics may provide useful signals.</t>
              </section>
              <section anchor="environmental-context">
                <name>Environmental Context</name>
                <t>Considers the location in which the device is seen (e.g., home, office, public places).</t>
                <t><strong>Rationale</strong>: Devices seen only in familiar, safe zones may be harmless. Appearances in unfamiliar or private locations without explanation raise concern.</t>
                <t>A confidence-based approach offers the following advantages:</t>
                <ul spacing="normal">
                  <li>
                    <t>Reduced False Positives: A confidence-based approach can help filter out benign tracking scenarios, such as transient signals or shared family devices. Instead of triggering alerts based solely on presence, the system can dynamically adjust its sensitivity based on behavioral patterns. For example, if a tracking device appears near a user only briefly or follows a predictable shared usage pattern (e.g., a Bluetooth tag frequently used by family members), it may be assigned a low confidence score. This prevents unnecessary alerts while still ensuring that persistent and anomalous tracking behaviors are flagged for user attention.</t>
                  </li>
                  <li>
                    <t>Context-Aware Threat Evaluation: The confidence score can incorporate contextual factors such as movement patterns, duration of proximity, and recurrence. For instance, if a tracker is detected only once in a public place (e.g., at a café or airport), it is less likely to indicate malicious tracking. However, if the same tracker reappears near the user across multiple locations or over an extended period, its confidence score increases, prompting a higher-priority alert.</t>
                  </li>
                  <li>
                    <t>Adaptive Alert Sensitivity: By dynamically adjusting detection thresholds based on confidence scores, the system can prioritize high-risk scenarios while minimizing unnecessary alerts. Users may receive warnings based on escalating levels of certainty, such as:
                    </t>
                    <ul spacing="normal">
                      <li>
                        <t>Low confidence: Informational notification (e.g., "An unfamiliar tracker was briefly detected nearby.")</t>
                      </li>
                      <li>
                        <t>Medium confidence: Warning with recommended actions (e.g., "A tracker has been detected multiple times near you. Check your surroundings.")</t>
                      </li>
                      <li>
                        <t>High confidence: Urgent alert with mitigation options (e.g., "A tracker has been persistently following you. Consider removing or disabling it.")</t>
                      </li>
                    </ul>
                  </li>
                </ul>
                <t>This approach ensures that users receive actionable and meaningful alerts, reducing notification fatigue while maintaining strong protection against unwanted tracking.</t>
              </section>
            </section>
          </section>
          <section anchor="tracking-tag-alerts">
            <name>Tracking Tag Alerts</name>
            <t>Tracking tags may be difficult to locate, and users may not have a device that can actively or passively scan for tracking tags. The DULT protocol should be built with <eref target="https://cdt.org/insights/centering-disability-in-mitigating-harms-of-bluetooth-tracking-technology/">accessibility in mind</eref> so that the most people can be protected by the protocol. In addition to push notifications on nearby devices, tracking tags themselves should be able to notify end users. This should include periodic sounds when away from all tag owners, along with lights and haptics so that people who are Deaf or hard of hearing can still locate them.</t>
          </section>
          <section anchor="crowdsourced-network-activities-logs">
            <name>Crowdsourced Network Activities Logs</name>
            <t><eref target="https://www.usenix.org/system/files/usenixsecurity23-stephenson-lessons.pdf">Stephenson et al.</eref> point out that Internet of Things devices like location tracking accessories do not have ways to reveal abusive behavior. This can be addressed through the use of detailed logs that provide insights for victims about which accounts have accessed the location of which accessories and when. Crowdsourced networks should log common user activities for review by each accessory owner, and should not be able to be easily deleted by accessory owners, who might do so as a way to hide evidence of unwanted location tracking.</t>
            <t>Logs should include sufficient detail to detect unwanted location tracking without being another vector for surveillance. For example, a log could state that "User B viewed the location of device X at [time]." By including information about user, device, and time, victims can determine whether their own accessories are being used to track them, and whether or not their accounts connected to the crowdsourced network are compromised.</t>
          </section>
        </section>
        <section anchor="finding-tracking-tags">
          <name>Finding Tracking Tags</name>
          <t>Even after a location tracker is detected through passive or active scanning, a user may have difficulty in locating it. For example, a tag may be buried under a vehicle cushion. Platforms should allow users who have discovered a tracker through passive or active scanning to request that the tracker signal its presence. This assistance should be done in a way that is accessible to users with sensory or other impairments by using multimodal signals as described in <xref target="tracking-tag-alerts"/>. Platforms may also implement other methods to assist in locating trackers, such as precision finding using Ultra-wideband.</t>
        </section>
        <section anchor="disabling-tracking-tags">
          <name>Disabling Tracking Tags</name>
          <t>In order to effectively prevent unwanted location tracking, users should be able to disable location tracker tags. This includes a non-owner user being tracked by a tag's owner, as well as an owner user who believes that an attacker is using their own tag to track them. Platforms should provide instructions for disabling tracking tags once they are located.</t>
          <t>Beyond simple deactivation, users should also receive guidance on additional steps they may take, depending on their specific situation:</t>
          <ul spacing="normal">
            <li>
              <t>Advice on destruction or preservation: In some cases, destroying a tracker may eliminate the risk of further tracking. However, users should be made aware that doing so may result in the loss of evidence that could otherwise be used to prove tracking or identify an abuser. Destroying the device might also lead to escalation in abusive contexts. Guidance should help users weigh these risks and determine the most appropriate course of action.</t>
            </li>
            <li>
              <t>Serial number access and use: Platforms should inform users how to retrieve the serial number or unique identifier of the tracker, even if the tag is not from the same platform. Serial numbers may be used to report the device, verify its origin, or, in cooperation with manufacturers or authorities, identify the registered owner(s) of the tag.</t>
            </li>
          </ul>
          <t>It is important to consider where educational and disabling guidance is hosted. For instance, information about disabling trackers should be publicly accessible, possibly from neutral, decentralized, or international organizations, to mitigate the risk of government censorship or politically motivated takedowns. This ensures access for vulnerable users, including those in high-risk environments or authoritarian regions.</t>
        </section>
        <section anchor="notification-management-for-trusted-devices">
          <name>Notification Management for Trusted Devices</name>
          <t>To reduce alert fatigue and improve user experience, implementations should allow users to snooze passive notifications from tracking tags that have been explicitly marked as trusted or friendly. This is particularly useful in scenarios where users regularly encounter the same tag (e.g., a family member's keys or a shared vehicle tag).</t>
          <t>Such snoozed tags may also be de-prioritized or grouped separately during active scans, helping users focus on unfamiliar or potentially malicious trackers. Platforms should make it easy to manage snoozed devices and review or revoke trust status as needed. It is also advisable to implement revalidation mechanisms, for example, resuming notifications after a period of time to prevent long-term blind spots.</t>
          <t>Some platforms may wish to implement family sharing or shared ownership models, where multiple users can be associated with a single tracker. However, this introduces the risk of abuse (e.g., an attacker adding a victim to the shared list in order to avoid triggering passive notifications), and therefore should be approached with caution and abuse mitigation in mind. These features are optional and may vary by platform. Whenever shared ownership is used, information about all owners should be made available when a tag is suspected of unwanted location tracking (see <xref target="passive-scanning"/>).</t>
        </section>
        <section anchor="privacy-and-security-requirements-todo">
          <name>Privacy and Security Requirements (TODO)</name>
        </section>
      </section>
      <section anchor="design-constraints">
        <name>Design Constraints</name>
        <t>There are also design constraints that the DULT Protocol must consider, including limitations of the Bluetooth Low Energy (BLE) protocol, power constraints, and device constraints.</t>
        <section anchor="bluetooth-constraints">
          <name>Bluetooth constraints</name>
          <t>Detecting trackers requires analyzing Bluetooth Low Energy (BLE) advertisement packets. Most advertisements are publicly transmitted, allowing passive scanning by any nearby receiver. While this enables open detection of unknown tracking devices, it also raises privacy concerns (see <xref target="introduction"/>). Some BLE implementations employ randomized MAC addresses and other privacy-preserving techniques, which could impact persistent tracking detection.</t>
          <t>The BLE payload in BLE 4.0 can support advertisement packets of up to 37 bytes. One current adoption of unwanted location tracking requires 12 of these bytes for implementing the basic protocol, with the remaining optional (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Implementation of the DULT protocol will need to consider these limitations. For example, in <eref target="https://eprint.iacr.org/2023/1332.pdf">Eldridge et al</eref>, implementing Multi-Dealer Secret Sharing required using two advertisement packets were needed instead of one due to payload constraints. While BLE 5.0 supports 255+ bytes of data, the protocol is not backwards compatible and thus may not be suitable for the DULT protocol.</t>
          <t>BLE advertisements operate in the 2.4 GHz ISM band, making them susceptible to interference from Wi-Fi, microwave ovens, and other wireless devices. The presence of environmental noise may degrade detection accuracy and introduce variability in scan results.</t>
          <t>BLE uses channel hopping for advertising (three advertising channels). Scanners need to cover all these channels to avoid missing advertisements.The BLE protocol also enforces strict power efficiency mechanisms, such as advertising intervals and connection event scheduling, which impact detection frequency. Devices operating in low-power modes or sleep modes may significantly reduce their advertisement frequency to conserve energy, making periodic detection less reliable. Furthermore, platform-level constraints, such as OS-imposed scanning limits and background activity restrictions, further impact the consistency and responsiveness of tracking detection mechanisms. For further discussion of power constraints, see <xref target="power-constraints"/>.</t>
          <t>Additionally, Bluetooth-based tracking systems typically rely on an active Bluetooth connection on the owner’s device to determine whether a tag is in the owner's possession. If the owner disables Bluetooth on their phone, the system may incorrectly infer that the tag is no longer nearby, potentially triggering a false positive alert for unwanted tracking. This limitation arises from the inability of Bluetooth-based systems to verify proximity without active signals from the owner’s device. There is currently no straightforward solution to this issue using Bluetooth alone, and it represents an inherent trade-off between privacy and detection reliability. Systems should account for this possibility and communicate it clearly to users.</t>
          <t>To address these challenges, detection mechanisms must balance efficiency, privacy, and accuracy while working within the constraints of the BLE protocol. Solutions may include leveraging multiple observations over time, integrating probabilistic risk scoring, and optimizing scanning strategies based on known BLE limitations.</t>
        </section>
        <section anchor="power-constraints">
          <name>Power constraints</name>
          <t>Unwanted tracking detection mechanisms typically rely on periodic Bluetooth scanning to identify unknown tracking devices. However, continuous background scanning poses a significant power challenge, especially for mobile devices with limited battery capacity. Maintaining high-frequency scans for extended periods can lead to excessive energy consumption, impacting device usability and battery longevity.</t>
          <t>To address these concerns, detection systems must incorporate power-efficient approaches that balance security with practicality. Adaptive scanning strategies can dynamically adjust the scan frequency based on contextual risk levels. For example, if a suspicious tracking device is detected nearby, the system can temporarily increase scan frequency while reverting to a lower-power mode when no threats are present.</t>
          <t>Event-triggered detection offers another alternative by activating scanning only in specific high-risk scenarios. Users moving into a new location or transitioning from a prolonged stationary state may require more frequent detection, while routine movement in known safe environments can minimize energy consumption. Additionally, passive Bluetooth listening techniques could serve as a low-power alternative to active scanning, allowing background detection without excessive battery drain.</t>
          <t>The DULT protocol must account for these power limitations in its design, ensuring that detection mechanisms remain effective without significantly degrading battery performance. Consideration of device-specific constraints, such as variations in power efficiency across smartphones, wearables, and IoT devices, will be critical in maintaining a balance between security and usability.</t>
        </section>
        <section anchor="device-constraints">
          <name>Device constraints</name>
          <t>Unwanted tracking detection is constrained by the diverse range of devices used for scanning, each with varying hardware capabilities, operating system restrictions, processing power, and connectivity limitations. These factors directly impact the effectiveness of detection mechanisms and must be carefully considered in protocol design.</t>
          <t>Hardware variability affects detection accuracy. While newer smartphones are equipped with advanced Bluetooth Low Energy (BLE) chipsets capable of frequent and reliable scanning, older smartphones, feature phones, and IoT devices may have reduced BLE performance. Differences in antenna sensitivity, chipset power, and OS-level access control can result in inconsistent detection, where some devices fail to detect tracking signals as reliably as others.</t>
          <t>Operating system restrictions can affect detection efforts, particularly due to background Bluetooth Low Energy (BLE) scanning policies. Both iOS and Android implement mechanisms to manage background scanning behavior, balancing energy efficiency and privacy considerations. On iOS, background BLE scanning operates with periodic constraints, which may limit the frequency of detection updates. Android applies similar policies to regulate background processes and optimize power consumption. Additionally, privacy frameworks on mobile platforms may influence how applications access and process certain device-related data. These factors, along with resource limitations in wearables and IoT devices, can impact the feasibility of continuous scanning and detection.</t>
          <t>Further, platform permission models can restrict access to BLE scan data. For example, Android requires coarse or fine location permissions to perform BLE scanning, and users may revoke these permissions. Additionally, radio coexistence (BLE and Wi-Fi sharing the 2.4 GHz band) can impact BLE performance, especially on devices with shared chipsets. User interface constraints, especially on wearables, may also limit how users receive or interact with tracking alerts.</t>
          <t>Processing and memory constraints are another limiting factor, particularly for low-end mobile devices and embedded systems. Continuous scanning and anomaly detection algorithms, especially those relying on machine learning-based threat detection, require substantial processing power and RAM. Devices with limited computational resources may struggle to maintain effective real-time detection without degrading overall performance. Ensuring that detection mechanisms remain lightweight and optimized for constrained environments is essential.</t>
          <t>Connectivity limitations introduce additional challenges. Some unwanted tracking detection mechanisms rely on cloud-based lookups to verify tracker identities and share threat intelligence. However, users in offline environments, such as those in airplane mode, rural areas with limited connectivity, or secure facilities with network restrictions, may be unable to access these services. In such cases, detection must rely on local scanning and offline heuristics rather than real-time cloud-based verification.</t>
          <t>To address these challenges, detection mechanisms should incorporate adaptive scanning strategies that adjust based on device capabilities, optimizing performance while maintaining security. Lightweight detection methods, such as event-triggered scanning and passive Bluetooth listening, can improve efficiency on constrained devices. Additionally, fallback mechanisms should be implemented to provide at least partial detection functionality even when full-featured scanning is not available. Ensuring that detection remains effective across diverse hardware and software environments is critical for broad user protection.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="I-D.draft-ietf-dult-accessory-protocol">
        <front>
          <title>Detecting Unwanted Location Trackers Accessory Protocol</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="David Lazarov" initials="D." surname="Lazarov">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="3" month="November" year="2024"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dult-accessory-protocol-00"/>
      </reference>
      <reference anchor="I-D.draft-ietf-dult-finding">
        <front>
          <title>Finding Tracking Tags</title>
          <author fullname="Christine Fossaceca" initials="C." surname="Fossaceca">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <date day="6" month="June" year="2025"/>
          <abstract>
            <t>   Lightweight location tracking tags are in wide use to allow users to
   locate items.  These tags function as a component of a crowdsourced
   tracking network in which devices belonging to other network users
   (e.g., phones) report which tags they see and their location, thus
   allowing the owner of the tag to determine where their tag was most
   recently seen.  This document defines the protocol by which devices
   report tags they have seen and by which owners look up their
   location.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dult-finding-01"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="I-D.detecting-unwanted-location-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="20" month="December" year="2023"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
      </reference>
    </references>
    <?line 578?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
