• tired_n_bored@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      23 hours ago

      May I ask you how? Or if you have more info? No criticism here, honest question. Afaik the only way to do that would be to fingerprint a behavioural pattern, which albeit possible is surely more secure than cell communication.

      • lemming741@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        21 hours ago

        The “find my” networks still function with randomized macs and “fully” powered down devices