Home GitHub Trending Security & Privacy Device-activity-tracker
πŸ”’ Security & Privacy Advanced

Device-activity-tracker

by gommzystudio

Device Activity Tracker via Messaging Protocol Analysis

Proof-of-concept demonstrating how messaging apps leak device status through delivery receipts and RTT analysis on WhatsApp and Signal.

4,513 Stars
623 Forks
4,513 Watchers
18 Issues
πŸ”’

About This Project

This security research project exposes a critical privacy vulnerability in popular messaging platforms by analyzing delivery receipt patterns and round-trip time (RTT) measurements. By leveraging these protocol-level signals, the tool can determine whether a target device is actively being used, in standby mode, or completely offlineβ€”all without requiring any interaction from the target user.

Built with TypeScript and Node.js, the project uses the Baileys library to interface with WhatsApp's protocol and demonstrates similar techniques applicable to Signal. The proof-of-concept reveals how seemingly innocuous protocol features can be exploited to track user behavior patterns, sleep schedules, and device usage habits over time.

This tool serves as an important educational resource for security researchers, privacy advocates, and developers who need to understand the implications of metadata leakage in encrypted messaging systems. It highlights how even end-to-end encrypted platforms can inadvertently expose sensitive behavioral data through timing attacks and protocol design choices.

The React-based interface provides real-time visualization of device activity patterns, making it easy to understand the severity of these information leaks and their potential impact on user privacy in real-world scenarios.

Key Features

  • Real-time device activity status detection via delivery receipts
  • RTT timing analysis to distinguish between active, standby, and offline states
  • WhatsApp protocol integration using Baileys library
  • React-based dashboard for visualizing activity patterns
  • Proof-of-concept demonstrating metadata leakage vulnerabilities

How You Can Use It

1

Security research and vulnerability disclosure for messaging platforms

2

Privacy impact assessment of messaging protocol designs

3

Educational demonstrations of metadata leakage in encrypted communications

4

Timing attack analysis and side-channel exploitation research

Who Is This For?

Security researchers, privacy advocates, penetration testers, and developers studying messaging protocol vulnerabilities