你的蓝牙设备泄露了你的什么信息
What Your Bluetooth Devices Reveal About You

原始链接: https://blog.dmcc.io/journal/2026-bluetooth-privacy-bluehood/

## Bluehood:揭示蓝牙的隐私影响 出于对隐私的担忧,开发者丹尼·麦考利构建了Bluehood,一个蓝牙扫描器,旨在揭示始终开启的蓝牙设备发出的令人惊讶的数据。受到WhisperPair等近期漏洞的启发,Bluehood展示了我们的生活信息是如何轻易被广播的——即使没有主动连接任何设备。 Bluehood被动运行,检测并分析附近的蓝牙信号,识别设备并追踪它们出现的时间模式。麦考利发现他可以辨别出送货员的日程安排、邻居的日常活动,甚至人们在家的时间,所有这些都不需要专门的设备。 核心问题不是有意分享,而是设备持续广播——包括那些*没有*用户控制的设备,如助听器、医疗植入物和车队车辆。具有讽刺意味的是,注重隐私的应用程序,如Briar和BitChat *需要*蓝牙,这在安全性和暴露之间造成了一种紧张关系。 Bluehood是一个Python应用程序,带有Web仪表板,它不是一个黑客工具,而是一个教育演示。它强调了看似无害的模式如何揭示我们生活中的重要信息,敦促用户在启用蓝牙时考虑便利性与隐私之间的权衡。该项目的源代码可在GitHub上获取,鼓励进一步的探索和贡献。

这个黑客新闻的讨论围绕着蓝牙设备泄露的惊人信息量。一篇文章(dmcc.io)关于蓝牙隐私的帖子引发了用户的分享。 几位评论者回忆起在手机早期玩的一个“游戏”——扫描附近的蓝牙设备,并试图根据设备名称推断所有者。那时,个性化的名称很常见,会提供线索。 对话随后转向潜在的监控用途。用户讨论了蓝牙数据(如MAC地址和设备类型)如何被用于追踪,有人回忆起一份报告,称国土安全部使用蓝牙扫描仪在高速公路上对司机进行画像。其他人则戏称伪装他们的蓝牙名称以观察反应,强调了既有随意观察,也有更 deliberate 数据收集的可能性。
相关文章

原文

Building Bluehood, a Bluetooth scanner that reveals what information we leak just by having Bluetooth enabled on our devices.

If you’ve read much of this blog, you’ll know I have a thing for privacy. Whether it’s running my blog over Tor, blocking ads network-wide with AdGuard, or keeping secrets out of my dotfiles with Proton Pass, I tend to think carefully about what data I’m exposing and to whom.

Last weekend I built Bluehood, a Bluetooth scanner that tracks nearby devices and analyses their presence patterns. The project was heavily assisted by AI, but the motivation was entirely human: I wanted to understand what information I was leaking just by having Bluetooth enabled.

The timing felt right. A few days ago, researchers at KU Leuven disclosed WhisperPair (CVE-2025-36911), a critical vulnerability affecting hundreds of millions of Bluetooth audio devices. The flaw allows attackers to hijack headphones and earbuds remotely, eavesdrop on conversations, and track locations through Google’s Find Hub network. It’s a stark reminder that Bluetooth isn’t the invisible, harmless signal we treat it as.

The Problem Nobody Talks About

We’ve normalised the idea that Bluetooth is always on. Phones, laptops, smartwatches, headphones, cars, and even medical devices constantly broadcast their presence. The standard response to privacy concerns is usually “nothing to hide, nothing to fear.”

But here’s the thing: even if you have nothing to hide, you’re still giving away information you probably don’t intend to.

From my home office, running Bluehood in passive mode (just listening, never connecting), I could detect:

  • When delivery vehicles arrived, and whether it was the same driver each time
  • The daily patterns of my neighbours based on their phones and wearables
  • Which devices consistently appeared together (someone’s phone and smartwatch, for instance)
  • The exact times certain people were home, at work, or elsewhere

None of this required any special equipment. A Raspberry Pi with a Bluetooth adapter would do the job. So would most laptops.

Devices You Can’t Control

What concerns me most isn’t that people choose to have Bluetooth enabled. It’s that many devices don’t give users the option to disable it.

Hearing aids are a good example. Modern hearing aids often use Bluetooth Low Energy so audiologists can connect and adjust settings or run diagnostics. Pacemakers and other implanted medical devices sometimes broadcast BLE signals for the same reason. The user can’t simply turn this off.

Then there are vehicles. Delivery vans, police cars, ambulances, logistics fleets, and trains often have Bluetooth-enabled systems for fleet management, diagnostics, or driver assistance. These broadcast continuously, and the drivers have no control over it.

Even consumer devices aren’t always straightforward. Many smartwatches need Bluetooth to function at all. GPS collars for pets require it to communicate with the owner’s phone. Some fitness equipment won’t work without it.

What’s interesting is that some of the most privacy-focused projects actually require Bluetooth to be enabled.

Briar is a peer-to-peer messaging app designed for activists and journalists operating in hostile environments. It doesn’t rely on central servers, and when the internet goes down, it can sync messages via Bluetooth or Wi-Fi mesh networks. It’s a genuinely useful tool for maintaining communications during internet blackouts or in areas with heavy surveillance.

BitChat takes this even further. It’s a decentralised messaging app that operates entirely over Bluetooth mesh networks—no internet required, no servers, no phone numbers. Each device acts as both client and relay, automatically discovering peers and bouncing messages across multiple hops to extend the network’s reach. The project explicitly targets scenarios like protests, natural disasters, and regions with limited or censored connectivity.

Both are genuinely excellent projects solving real problems. But to use them, you need Bluetooth enabled. And every device with Bluetooth enabled is broadcasting its presence to anyone nearby who cares to listen.

This creates a strange tension. Tools designed to protect privacy often require a feature that compromises privacy in other ways.

People often underestimate what patterns reveal. A bad actor with a Bluetooth scanner doesn’t need to know your name. They just need to observe behaviour over time.

Consider what someone could learn by monitoring Bluetooth signals in a residential area for a few weeks:

  • When is the house typically empty?
  • Does someone visit every Thursday afternoon?
  • Is there a regular pattern that suggests shift work?
  • When do the children come home from school?
  • Which homes have the same delivery driver, suggesting similar shopping habits?

If there’s damage to your property, you could potentially go back through the logs and see which devices were in range at that time. A smartwatch on a dog-walker passing by. A phone in someone’s pocket. A vehicle with fleet tracking.

These might seem like edge cases, but they illustrate a broader point: we’re constantly leaving digital breadcrumbs we don’t even think about.

What Bluehood Actually Does

Bluehood is a Python application that runs on anything with a Bluetooth adapter. It continuously scans for nearby devices, identifies them by vendor and BLE service UUIDs, and tracks when they appear and disappear.

The key features:

  • Passive scanning: It only listens. It doesn’t try to connect or interact with any device.
  • Device classification: Phones, audio devices, wearables, vehicles, IoT devices, and more, identified by BLE fingerprints.
  • Pattern analysis: Hourly and daily heatmaps, dwell time tracking, and detection of correlated devices.
  • Filtering: Randomised MAC addresses (used by modern phones for privacy) are detected and hidden from the main view.
  • Web dashboard: A simple interface for monitoring and analysis.

You can run it in Docker or install it directly. It stores data in SQLite and optionally sends push notifications via ntfy.sh when watched devices arrive or leave.

Running It

The simplest way to try Bluehood is with Docker:

git clone https://github.com/dannymcc/bluehood.git
cd bluehood
docker compose up -d

The dashboard is available at http://localhost:8080.

If you prefer a manual install:

sudo pacman -S bluez bluez-utils python-pip  # Arch
sudo apt install bluez python3-pip           # Debian/Ubuntu

pip install -e .
sudo bluehood

Bluetooth scanning needs elevated privileges. You can either run as root, grant capabilities to Python, or use the included systemd service for always-on monitoring.

The Point of All This

Bluehood isn’t a hacking tool. It’s an educational demonstration of what’s possible with commodity hardware and a bit of patience.

I built it because I wanted to see for myself what I was broadcasting. The results were sobering. Even with no malicious intent, anyone with basic technical knowledge could learn a lot about my household just by sitting in their car and running a script.

This isn’t about paranoia. It’s about understanding the trade-offs we make when we leave wireless radios enabled on our devices. For some use cases, Bluetooth is essential. For others, it’s just convenience. Being aware of what you’re exposing is the first step to making informed decisions about which category your devices fall into.

If you try Bluehood and it makes you think twice about your own Bluetooth habits, it’s done its job.


The source code is available on GitHub. Feedback and contributions welcome.

联系我们 contact @ memedata.com