SlideShare a Scribd company logo
1
Micro-Location

Breakout
Session
And we’re
here
because…
An iPhone and a Nexus
5 walk into a bar…
DC should be
talking about
mobile.
@StateOfMobileDC



#StateOfMobile
What is Micro-Location?
!
!
!
Beacon

Nearby?
Misconceptions
NOT GPS… 

Micro-location is about proximity not location
NOT about spying, tracking, or watching…

Micro-location beacons themselves record nothing
months (3-6) year(s) 50m Range*
Now with more

Advertising Packets!!!
Up to 50m Range*
Preamble

(1 Byte)
Protocol Data Unit"
(2-39 Bytes)
CRC"
(3 Bytes)
Access
Address

(4 Bytes)
Advertising 

Packet
Protocol Data Unit"
(39 Bytes)
Header

(2 Bytes)
iBeacon

Prefix"
(9 Bytes)
UUID"
(16 Bytes)
Major"
(2 Bytes)
Minor"
(2 Bytes)
Power"
(2 Bytes)
MAC"
(6 Bytes)
02:01:1a:1a:ff:4c:00:02:15
e2:c5:6d:b5:df:fb:48:d2:b0:60:d0:f5:a7:10:96:e0
00:01 00:01 c5
PDU
What can we do with it?
Release the Beacons
Apple Passbook"
+ iBeacon
• Bring a Pass to the
lock screen
• Display a static
message
• No Vibrate, No Sound,
Nothing when unlocked
iOS App (Background)
Callbacks: Enter Region — Exit Region — Ranging*
Do Not need Background Execution"
May not be user killable
iOS App (Running)
Callbacks:



— Enter Region 

— Exit Region 

— Ranging
What will people 

do with it?
• Shelf-level shopping apps"
• Alerts, Warnings — Virtual Signs + Caution Tape"
• Museums — Exhibit Level information"
• Indoor Location*"
!
• What if YOUR phone was the beacon?
Thanks

More Related Content

Similar to Micro-Location Explained

DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
Felipe Prado
 
nodebots presentation @seekjobs
nodebots presentation @seekjobsnodebots presentation @seekjobs
nodebots presentation @seekjobs
Esteban (Steven) De Salas
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
Michael Smith
 
Mobile business
Mobile businessMobile business
Mobile business
canishk
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
Aomam Rattiya
 
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
Priyanka Aash
 
Ch9
Ch9Ch9
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
Ae Naiong
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
Felipe Prado
 
Mobile Device-Architecture
Mobile Device-ArchitectureMobile Device-Architecture
Mobile Device-Architecture
cyberns_
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
zahadath
 
14 scaleabilty wics
14 scaleabilty wics14 scaleabilty wics
14 scaleabilty wics
ashish61_scs
 
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
KevinYangYang
 
IEEE_VTC_2016_Spring_PPT
IEEE_VTC_2016_Spring_PPTIEEE_VTC_2016_Spring_PPT
IEEE_VTC_2016_Spring_PPT
Ziming He
 
What the Fax!?
What the Fax!?What the Fax!?
What the Fax!?
Priyanka Aash
 
Chapter03
Chapter03Chapter03
Chapter03
Muhammad Ahad
 
Wireless Communications Technology - R&D
Wireless Communications Technology - R&DWireless Communications Technology - R&D
Wireless Communications Technology - R&D
Dr. Mazlan Abbas
 
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
Alexandra Masterson
 
เฉลยโอเน็ต53
เฉลยโอเน็ต53เฉลยโอเน็ต53
เฉลยโอเน็ต53
ณัฐพล บัวพันธ์
 
Mobile computing
Mobile computingMobile computing
Mobile computing
shubham chavan
 

Similar to Micro-Location Explained (20)

DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
 
nodebots presentation @seekjobs
nodebots presentation @seekjobsnodebots presentation @seekjobs
nodebots presentation @seekjobs
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerDefCon 2012 - Near-Field Communication / RFID Hacking - Miller
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller
 
Mobile business
Mobile businessMobile business
Mobile business
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of R...
 
Ch9
Ch9Ch9
Ch9
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Mobile Device-Architecture
Mobile Device-ArchitectureMobile Device-Architecture
Mobile Device-Architecture
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
14 scaleabilty wics
14 scaleabilty wics14 scaleabilty wics
14 scaleabilty wics
 
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
Bluetooth Technology-Introduction to Bluetooth, Technical Specifications, Blu...
 
IEEE_VTC_2016_Spring_PPT
IEEE_VTC_2016_Spring_PPTIEEE_VTC_2016_Spring_PPT
IEEE_VTC_2016_Spring_PPT
 
What the Fax!?
What the Fax!?What the Fax!?
What the Fax!?
 
Chapter03
Chapter03Chapter03
Chapter03
 
Wireless Communications Technology - R&D
Wireless Communications Technology - R&DWireless Communications Technology - R&D
Wireless Communications Technology - R&D
 
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
 
เฉลยโอเน็ต53
เฉลยโอเน็ต53เฉลยโอเน็ต53
เฉลยโอเน็ต53
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Micro-Location Explained