Skip to main content

Detecting Unwanted Location Trackers
draft-detecting-unwanted-location-trackers-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
Authors Brent Ledvina , Zachary Eddinger , Ben Detwiler , Siddika Parlak Polatkan
Last updated 2023-11-06 (Latest revision 2023-05-02)
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document lists a set of best practices and protocols for accessory manufacturers whose products have built-in location- tracking capabilities. By following these requirements and recommendations, a location-tracking accessory will be compatible with unwanted tracking detection and alerts on mobile platforms. This is an important capability for improving the privacy and safety of individuals in the circumstance that those accessories are used to track their location without their knowledge or consent.

Authors

Brent Ledvina
Zachary Eddinger
Ben Detwiler
Siddika Parlak Polatkan

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)