Device-activity-tracker
by gommzystudio
Device Activity Tracker via Messaging Protocol Analysis
Proof-of-concept demonstrating how messaging apps leak device status through delivery receipts and RTT analysis on WhatsApp and Signal.
- 4,513+ GitHub stars
- Built with TypeScript
- Real-time device activity status detection via delivery receipts
- Other license
About This Project
This security research project exposes a critical privacy vulnerability in popular messaging platforms by analyzing delivery receipt patterns and round-trip time (RTT) measurements. By leveraging these protocol-level signals, the tool can determine whether a target device is actively being used, in standby mode, or completely offlineβall without requiring any interaction from the target user.
Built with TypeScript and Node.js, the project uses the Baileys library to interface with WhatsApp's protocol and demonstrates similar techniques applicable to Signal. The proof-of-concept reveals how seemingly innocuous protocol features can be exploited to track user behavior patterns, sleep schedules, and device usage habits over time.
This tool serves as an important educational resource for security researchers, privacy advocates, and developers who need to understand the implications of metadata leakage in encrypted messaging systems. It highlights how even end-to-end encrypted platforms can inadvertently expose sensitive behavioral data through timing attacks and protocol design choices.
The React-based interface provides real-time visualization of device activity patterns, making it easy to understand the severity of these information leaks and their potential impact on user privacy in real-world scenarios.
Key Features
- Real-time device activity status detection via delivery receipts
- RTT timing analysis to distinguish between active, standby, and offline states
- WhatsApp protocol integration using Baileys library
- React-based dashboard for visualizing activity patterns
- Proof-of-concept demonstrating metadata leakage vulnerabilities
How You Can Use It
Security research and vulnerability disclosure for messaging platforms
Privacy impact assessment of messaging protocol designs
Educational demonstrations of metadata leakage in encrypted communications
Timing attack analysis and side-channel exploitation research
Who Is This For?
Security researchers, privacy advocates, penetration testers, and developers studying messaging protocol vulnerabilities