Detecting Unwanted Location Trackers Accessory Protocol
draft-ledvina-dult-accessory-protocol-00
Document | Type |
Replaced Internet-Draft
(dult WG)
Expired & archived
|
|
---|---|---|---|
Authors | Brent Ledvina , David Lazarov , Ben Detwiler , Siddika Parlak Polatkan | ||
Last updated | 2024-08-08 (Latest revision 2024-06-22) | ||
Replaced by | draft-ietf-dult-accessory-protocol | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Adopted by a WG | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-dult-accessory-protocol | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document lists a set of best practices and protocols for accessory manufacturers whose products have built-in location- tracking capabilities. By following these requirements and recommendations, a location-tracking accessory will be compatible with unwanted tracking detection and alerts on mobile platforms. This is an important capability for improving the privacy and safety of individuals in the circumstance that those accessories are used to track their location without their knowledge or consent.
Authors
Brent Ledvina
David Lazarov
Ben Detwiler
Siddika Parlak Polatkan
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)