Device Activity Tracker

Device Activity Tracker

How (almost) any phone number can be tracked via WhatsApp

1 follower

Device Activity Tracker is an open-source proof-of-concept that shows how you can infer a phone’s activity state via WhatsApp & Signal — using only timing information from “ghost” reactions.
Device Activity Tracker gallery image
Device Activity Tracker gallery image
Free
Launch Team
Wispr Flow: Dictation That Works Everywhere
Wispr Flow: Dictation That Works Everywhere
Stop typing. Start speaking. 4x faster.
Promoted

What do you think? …

gommzy
Maker
📌
It’s based on the “Careless Whisper” side-channel idea: by sending tiny, invalid reactions to special message IDs and measuring the round-trip time (RTT) of the silent delivery receipts, you can infer patterns like: • low RTT ≈ screen on / active (often on Wi-Fi) • medium RTT ≈ active on mobile data • high RTT ≈ screen off / standby • timeouts / repeated failures ≈ offline (airplane mode / no network) All of this happens without: • any visible messages • any notifications • any popups or UI artifacts on the target device The same class of leak exists for Signal as well. This project is for research and education only. The goal is to make this side-channel visible, reproducible, and easy to discuss with security teams, researchers, and journalists — not to enable stalking or abuse.