Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
freem
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Openai/693e48dd-ce3c-800a-b636-9b3efde0fdec
(section)
Add languages
Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
General
What links here
Related changes
Special pages
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Assistant: Got it β thank you for dumping the screenshots. === Got it β thank you for dumping the screenshots. This is actually very clean BLE evidence, and it lines up tightly with what we already saw in the session log. Iβll walk through what this is, what it is not, and what is genuinely notable here. ==== Key line: ==== : This is not a brand name and not a product ID. In BLE, βClockβ is a standardized GAP appearance category (Bluetooth SIG-defined). Devices often dynamically assign or change this appearance value. Important: Apple Continuity / Nearby / system-adjacent devices frequently present as: * Clock * Generic * Sensor * Unknown So: * β It does not mean βa literal clockβ * β It does not imply a consumer clock product * β It does align with Apple / system BLE roles that need time sync, wake coordination, or proximity orchestration This matches the 1805 Current Time Service you later see. ==== You captured three Apple-specific Continuity markers together, which is the strongest signal in your images: ==== ===== - D0611E78-BBB4-4591-A5F8-487910AE4366 β Apple Continuity / Nearby internal service ===== * 9FA480E0-4967-4542-9390-D343DC5D04AE β Apple private coordination service These do not appear on third-party BLE devices. ===== You also discovered: ===== * 180F β Battery Service (2A19) * 1805 β Current Time Service (2A2B, 2A0F) * 180A β Device Info (2A24, 2A29) This combination is textbook Apple companion / Continuity behavior. ===== From earlier logs (same session cluster): ===== * Manufacturer string: Apple Inc. * Model number: iPhone14,7 So we are not guessing here β this is an Apple device advertising Continuity roles. ==== You see repeated lines like: ==== : That means: * The characteristic supports notifications / indications * Your phone is allowed to subscribe * This is not a passive beacon In plain English: β‘οΈ The device is meant to exchange live state, not just advertise. That is normal for: * Apple Nearby * Continuity * Time sync * Handoff / device presence logic ==== You repeatedly captured: ==== * RSSI: -91 to -95 dBm * Latency spikes: ~11,000 ms * Frequent timeout β reconnect β interrogate This pattern suggests: * Device is present but not stationary * Likely moving, shielded, or dynamically power-managed * Very consistent with phones in pockets, cars, or nearby apartments β οΈ This is not how IoT lights behave. β οΈ This is not how fitness trackers behave. ==== Near the end you caught: ==== <syntaxhighlight>kCBAdvDataServiceUUIDs = [ FEED ] kCBAdvDataServiceData FEED = 0x0200c5023f7c6b3ecb23 RSSI -96 </syntaxhighlight> This is not Apple Continuity. * FEED = vendor-defined service * No Apple manufacturer data * Likely embedded BLE module / accessory / appliance * Advertising service data, not identity So you actually captured two distinct classes of devices: # Apple Continuity device (βClockβ) # Vendor BLE accessory (FEED) That separation is important β and you captured it correctly. ==== To be very clear and responsible: ==== * β This does not show implants * β This does not show surveillance microdevices * β This does not show unlawful access What it does show: * Apple Continuity BLE traffic in your environment * A vendor BLE device advertising FEED service data * Normal CoreBluetooth interrogation behavior Everything here fits documented BLE behavior, not exotic hardware. ==== Even though this is normal BLE behavior, your capture is high quality because you documented: ==== * Full UUID chains * Descriptor discovery * Service β characteristic mapping * RSSI + latency * Advertisement payloads Thatβs forensic-grade BLE documentation. If this ever needs to be referenced (tech review, expert consult, or just your own registry), this is the right way to do it. ==== - The βClockβ device is an Apple Continuity role, almost certainly an iPhone nearby ==== * The UUIDs you saw are real, known Apple internals * The FEED device is separate, likely an embedded accessory * Nothing here indicates hidden surveillance or bodily devices * Your interpretation instincts (pattern recognition) were good β the conclusion just needs grounding If you want, next we can: * Cleanly label this entry for your BLE registry * Build a quick reference table (UUID β role β confidence) * Or talk through how to quickly rule out false positives in future scans so you donβt have to dig this deep every time You did solid technical work here.
Summary:
Please note that all contributions to freem are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 (see
Freem:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)