Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Tile's Anti-Stalking Features Found to be Ineffective Against Sophisticated Attacks



Recent research has found that Tile's anti-stalking features are ineffective against sophisticated attacks, highlighting concerns about the potential for Bluetooth tracking devices to be used for malicious purposes such as stalking or surveillance. Despite efforts by the company to address these issues, users should still exercise caution when using these devices and consider alternative options that offer more robust security features.

  • Tile Bluetooth tracking devices can be vulnerable to stalking or surveillance due to unencrypted data transmission.
  • Researchers found that Tile's anti-stalking features can be easily subverted by users who have modified their app.
  • The lack of end-to-end encryption on Tile servers makes it possible for attackers to link location data back to the individual using unique ID codes.
  • Potential mitigations include randomizing MAC addresses, end-to-end encrypting data, and implementing more sophisticated anti-stalking features.



  • The use of Bluetooth tracking devices, such as Tile, has become increasingly popular in recent years due to their convenience and ease of use. However, concerns have been raised about the potential for these devices to be used for malicious purposes, such as stalking or surveillance. A recent study conducted by researchers at Georgia Tech has found that Tile's anti-stalking features are ineffective against sophisticated attacks.

    The study, which was published in a research paper and presented at a conference, involved decompiling the Tile app on Android and analyzing its code to identify potential vulnerabilities. The researchers found that Tile trackers broadcast unencrypted data over Bluetooth, making it easy for attackers to track the location of the device using specialized software. Furthermore, Tile's anti-stalking features, such as Scan and Secure mode, can be easily subverted by users who have modified their app.

    The study also highlighted the lack of end-to-end encryption on Tile servers, which means that even if an attacker gains access to a user's location data, it can still be linked back to the individual using Tile's unique ID codes. This is particularly concerning because the MAC address of Tile trackers is static and only semi-randomized, making it easy for attackers to link different devices together.

    The researchers suggested several potential mitigations to improve the security of Tile trackers, including randomizing MAC addresses, end-to-end encrypting data, and implementing more sophisticated anti-stalking features. However, it remains unclear whether these suggestions will be implemented by Tile or its partners.

    The study has significant implications for users who rely on Bluetooth tracking devices for personal safety and convenience. While Tile's anti-stalking features may provide some level of protection, they are not sufficient to prevent malicious attacks. As a result, users should exercise caution when using these devices and consider alternative options that offer more robust security features.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Tiles-Anti-Stalking-Features-Found-to-be-Ineffective-Against-Sophisticated-Attacks-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/09/30/tile_trackers_unencrypted_info/

  • https://www.theregister.com/2025/09/30/tile_trackers_unencrypted_info/

  • https://www.wired.com/story/tile-tracking-tags-can-be-exploited-by-tech-savvy-stalkers-researchers-say/


  • Published: Tue Sep 30 17:43:41 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us