Industry News

Wi-Fi-Based Localization Not that Invasive, Tracking Company Claims

Mobile marketing is nothing new, given that SMS advertising and Bluetooth proximity broadcasts have been around for years, but tracking companies still have great plans for handset owners. A new startup called Euclid Elements plans to track retail shoppers by monitoring the MAC addresses their Wi-Fi-enabled smartphones broadcast usually and identify returning customers while keeping their privacy a priority.

Geolocation Tracking using Wi-Fi

According to the company, the tracking process is strictly related to monitoring the MAC address of the wireless card in the smartphone, a unique identifier that is recorded by a sensor when the shopper enters the store. The collected data is stored for 18 months in the company’s database, which then becomes available to the retailer in an aggregated form.

Even if the data provided to the retailer is not enough to identify a unique visitor because of the aggregation, fears of privacy invasion, direct or indirect, have started to show. The company’s detailed logs about the shopping habits of millions of Americans might land into the wrong hands following a data breach. Although the company offers an opt-out mechanism, it involves visiting a page on Euclid’s web site.

Once shoppers give up this information, in some cases without realizing it, it’s out of their hands,” says Parker Higgins, an activist at the Electronic Frontier Foundation. “A data breach, a government subpoena, an overreaching retailer — all these things can mean invasions of personal privacy in ways people have no control over.

Euclid is not the only technology provider that collects Wi-Fi related information. Microsoft and Google are only two of the companies that maintain databases of mobile devices, while others (including social networks such as Foursquare) rely on Wi-Fi information to improve the position of the phone on the GPS map.

About the author


Bogdan Botezatu is living his second childhood at Bitdefender as senior e-threat analyst. When he is not documenting sophisticated strains of malware or writing removal tools, he teaches extreme sports such as surfing the web without protection or rodeo with wild Trojan horses. He believes that most things in life can be beat with strong heuristics and that antimalware research is like working for a secret agency: you need to stay focused at all times, but you get all the glory when you catch the bad guys.