Detecting Unwanted Location Trackers Accessory Protocol
draft-ietf-dult-accessory-protocol-00
| Document | Type |
Expired Internet-Draft
(dult WG)
Expired & archived
|
|
|---|---|---|---|
| Authors | Brent Ledvina , David Lazarov , Ben Detwiler , Siddika Parlak Polatkan | ||
| Last updated | 2025-05-07 (Latest revision 2024-11-03) | ||
| Replaces | draft-ledvina-dult-accessory-protocol | ||
| RFC stream | Internet Engineering Task Force (IETF) | ||
| Intended RFC status | (None) | ||
| Formats | |||
| Additional resources | Mailing list discussion | ||
| Stream | WG state | WG Document | |
| Document shepherd | (None) | ||
| IESG | IESG state | Expired | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document lists a set of best practices and protocols for accessory manufacturers whose products have built-in location- tracking capabilities. By following these requirements and recommendations, a location-tracking accessory will be compatible with unwanted tracking detection and alerts on mobile platforms. This is an important capability for improving the privacy and safety of individuals in the circumstance that those accessories are used to track their location without their knowledge or consent.
Authors
Brent Ledvina
David Lazarov
Ben Detwiler
Siddika Parlak Polatkan
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)