Tile Tracking Fail: Unencrypted Data Leaves Users Vulnerable Despite Life360 Promises
Tile Bluetooth trackers leak identifying data in plain text, making it easy for stalkers to track victims, despite Life360’s security promises, Georgia Tech researchers warn. They found unencrypted signals and static MAC addresses, raising concerns about Bluetooth tag stalking. Life360’s communication on these vulnerabilities has apparently fizzled out.

Hot Take:
Tile trackers are like that friend who promises to keep a secret but accidentally posts it on social media. Despite Life360’s security pledges, their Bluetooth trackers are leaking data faster than a sieve, giving potential stalkers a free pass to track their victims. The Georgia Tech researchers are throwing shade at Tile’s security, revealing a series of flaws that make these tags about as secure as a chocolate teapot.
Key Points:
- Georgia Tech researchers found that Tile trackers lack end-to-end encryption, leaking data openly.
- Tile’s static MAC addresses and semi-randomized IDs allow for easy tracking over time.
- Tile’s anti-stalking feature is easily bypassed, making it ineffective against potential stalkers.
- Life360 has been slow to respond to vulnerabilities despite claims of recent improvements.
- The researchers recommend avoiding Tile devices if concerned about privacy due to unresolved security flaws.