• tired_n_bored@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    20 hours ago

    May I ask you how? Or if you have more info? No criticism here, honest question. Afaik the only way to do that would be to fingerprint a behavioural pattern, which albeit possible is surely more secure than cell communication.

    • lemming741@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 hours ago

      The “find my” networks still function with randomized macs and “fully” powered down devices