You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For privacy reasons, most Apple devices, and some Android devices use randomized Bluetooth addresses when not paired to a host device. Devices do however use their real address when responding to a NAME request, but that request must already include the real address in the request.
Other projects, such as Monitor use a "known BLE addresses" list, and then issue NAME requests to figure out a device's real Bluetooth address.
Is this something that would be useful to FIND when doing passive scanning, or does it have some other way of consistently identifying a device?
The text was updated successfully, but these errors were encountered:
For privacy reasons, most Apple devices, and some Android devices use randomized Bluetooth addresses when not paired to a host device. Devices do however use their real address when responding to a NAME request, but that request must already include the real address in the request.
Other projects, such as Monitor use a "known BLE addresses" list, and then issue NAME requests to figure out a device's real Bluetooth address.
Is this something that would be useful to FIND when doing passive scanning, or does it have some other way of consistently identifying a device?
The text was updated successfully, but these errors were encountered: