Skip to main content

Detecting Unwanted Location Trackers Accessory Protocol
draft-ietf-dult-accessory-protocol-00

Document Type Expired Internet-Draft (dult WG)
Expired & archived
Authors Brent Ledvina , David Lazarov , Ben Detwiler , Siddika Parlak Polatkan
Last updated 2025-05-07 (Latest revision 2024-11-03)
Replaces draft-ledvina-dult-accessory-protocol
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document lists a set of best practices and protocols for accessory manufacturers whose products have built-in location- tracking capabilities. By following these requirements and recommendations, a location-tracking accessory will be compatible with unwanted tracking detection and alerts on mobile platforms. This is an important capability for improving the privacy and safety of individuals in the circumstance that those accessories are used to track their location without their knowledge or consent.

Authors

Brent Ledvina
David Lazarov
Ben Detwiler
Siddika Parlak Polatkan

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)