logoalt Hacker News

Retricyesterday at 8:52 PM1 replyview on HN

How things are aren’t the only way things could be.

A receiver could use a new random ID to call “collect” to a secure third party network which agrees to pay for the base stations bandwidth for every connection. The station then responds to the base station yep ID X’s bandwidth will be paid by vert tel.

Obviously, this doesn’t eliminate the possibility of tracking as you’d want the cell to have multiple connections created and abandoned randomly, but it does remove that ID you’re concerned with.


Replies

wizzwizz4yesterday at 9:19 PM

GP is referring to manufacturing variance in the radio equipment, not the deliberately-inserted tracking identifiers. See, for example, doi:10.1016/j.dsp.2025.105201 and doi:10.3390/rs17152659 for relatively cheap approaches.

The solution to this is just to make it a crime to store and process the results of such analysis applied to radio signals, without consent of the data subject. (GDPR jurisdictions have that already.)