Skip to main content
  • IETF Meetings recording playback system now open source

    The source code of the playback system for the recordings of IETF meeting sessions was recently released by Meetecho under an open source license, and the IETF has now deployed its own instance of the system.

    2 Oct 2024
  • Workshop on the Next Era of NEtwork Management OPerationS (NEMOPS)

    A workshop organized by the Internet Architecture Board (IAB) aims to chart a path for the development of future network management protocols and techniques. The Next Era of Network Management Operations (NEMOPS) workshop will begin by assessing the impacts of the previous IAB workshop on both network operations and protocol development.

    20 Sep 2024
  • RFC data visualizations accessibility review

    RFCs are freely available to download, copy, publish, display and distribute. One benefit of providing free access to RFCs is that they can be used by the largest number of people possible to build a better Internet for all. To truly include as many people as we can, the IETF community has consistently tried to uphold accessibility standards for the publication of RFCs.

    10 Sep 2024
  • Consultation on the Second IASA2 Retrospective

    The IETF Administration LLC is soliciting community feedback on the second retrospective on the IETF Administrative Support Activity (IASA 2.0). This follows our first retrospective from 2021.

    4 Sep 2024
  • IETF email service outage deferred

    The scheduled outage of the IETF email processing system has been deferred again to allow time to complete further work discovered to be required for a successful transition.

    3 Sep 2024

Filter by topic and date

Filter by topic and date

New working group aims to make spotting unwanted trackers easier

14 Mar 2024

Location-tracking accessories provide numerous benefits to users, such as being able to find where they left their keys. But they can also have security and privacy implications if used for malicious purposes. A newly formed IETF working group has taken on the task to standardize a protocol that protects people against being unknowingly tracked.

The newly-chartered Detecting Unwanted Location Trackers (DULT) working group was formed after intense discussions across two Birds of a Feather sessions.

DULT

While the working group goals may seem straightforward, the technical issues involved in defining a protocol that enables implementation across multiple device manufacturers require careful consideration. For example, the working group will consider mechanisms to ensure that devices that do not correctly implement or adhere to the DULT protocol can be detected and excluded from being trackable via crowdsourced location networks.

And, of course, the mechanisms specified by the WG must be designed to not create new vectors for user tracking.

The complete charter for the DULT working group provides further detail about how it will go about its work. For example, the charter calls for the working group to to work with gender-based violence experts throughout development of the protocol. The combination of the trauma-informed expertise with the technical knowledge will be an important aspect to address these specific threat models. Since most of the existing tracking accessories use Bluetooth, the DULT WG will coordinate, as needed, with the Bluetooth SIG and IETF 6lo WG

While the WG will aim to minimize hardware changes needed in tracking accessories to implement this protocol, it will also aim to not preclude adoption by manufacturers of larger devices whose primary purpose is not location tracking, but have location tracking capabilities (e.g., headphones, bicycles, and smartphones).

The DULT working group will meet for the first time at the upcoming IETF 119 meeting.


Share this page