I've written a bunch more on the link (+photos are there), but essentially this uses 2 fingerprinting approaches: - retro-reflectivity of the camera sensor by looking at IR reflections. mixed results here. - wireless traffic (primarily BLE, also looking into BTC and wifi)
For the latter, I'm currently just using an ESP32, and I can consistently detect when the Meta Raybans are 1) pairing, 2) first powered on, 3) (less consistently) when they're taken out of the charging case. When they do detect something, it plays a little jingle next to your ear.
Ideally I want to be able to detect them when they're in use, and not just at boot. I've come across the nRF52840, which seems like it can follow directed BLE traffic beyond the initial broadcast, but from my understanding it would still need to catch the first CONNECT_REQ event regardless. On the bluetooth classic side of things, all the hardware looks really expensive! Any ideas are appreciated. Thanks!
And probably highly illegal.
Doing it targeted is more difficult since it does frequency hopping, but you could probably reverse the frequency hopping algorithm to target specifically Bluetooth and force high packet loss.
This is still illegal for radio jamming reasons, and also patent infringement since a misbehaving Bluetooth device has not gotten permission to use Bluetooth patents held by SIG.
It's among the most illegal things you could easily do with basic electronics equipment.
why? Part of it is historical; it used to be complicated, so being in possession of one got you in trouble with the anti terrorism squad.
These days; it's because it can block emergency services, police and military radio, and burglary alarms.
They may be lenient for a nerd playing with a router but the law its not on your side when push comes to shove.
https://legalclarity.org/are-signal-jammers-illegal-in-the-u...