Moneycontrol
HomeTechnologyTile security flaws raise alarming privacy risks for users

Tile security flaws raise alarming privacy risks for users

Security researchers have found that Tile trackers broadcast unencrypted identifiers, creating risks of stalking, surveillance, and even false accusations against innocent users. Tile’s parent company, Life360, has yet to confirm if these flaws have been properly fixed.

September 29, 2025 / 19:50 IST
Story continues below Advertisement
Tile tracker

Researchers have uncovered serious vulnerabilities in Tile tracking devices that could allow both the company itself and malicious stalkers to monitor user locations. The findings reveal fundamental flaws in how Tile manages security compared to Apple’s AirTags, raising significant privacy concerns for millions of users worldwide.

Like AirTags, Tile tags use Bluetooth to broadcast identity codes to nearby smartphones. These codes rotate every 15 minutes to prevent permanent tracking. However, researchers at the Georgia Institute of Technology discovered that Tile tags not only transmit the rotating ID but also their static MAC address, and crucially, neither of these identifiers are encrypted. This creates an opportunity for persistent and unauthorised surveillance.

Story continues below Advertisement

Unlike AirTags, which broadcast only encrypted rotating codes, Tile’s approach means that anyone with a basic radio frequency scanner could intercept unencrypted transmissions. The data can include the MAC address and unique ID, allowing a stalker to build a long-term profile of a tag’s movements. The researchers further revealed that Tile’s servers receive this information in unencrypted form, meaning the company itself has the ability to track tags despite claiming otherwise.

The security flaws go even deeper. The rotating IDs used by Tile are generated in a way that makes them predictable. With as little as one captured ID, attackers can reliably forecast future codes for the lifetime of the tag. This enables systemic surveillance with minimal effort. Researcher Akshaya Kumar explained that recording a single message from a device is enough to fingerprint it indefinitely, significantly increasing the risks of privacy abuse.