Bluetooth trackers like Apple's AirTag, Tile, Samsung's SmartTag, and Chipolo are deliberately cheap, small, and long-lived on a single battery. That combination is exactly what makes them useful for finding luggage — and exactly what makes them dangerous when attached to a person without their knowledge. Understanding how they locate things is the key to understanding both the threat and the defense.
How These Trackers Actually Find Things
A common misconception is that trackers contain GPS. They do not. An AirTag has no cellular radio and no satellite receiver. It is, fundamentally, a Bluetooth Low Energy beacon that broadcasts a rotating identifier into the air every few seconds. On its own, it knows nothing about where it is.
The location comes from crowd-sourced finding networks. Apple's Find My network, for example, enlists every nearby iPhone, iPad, and Mac as an anonymous relay. When any of those devices hears a tracker's beacon, it bundles its own GPS position with the tracker's identifier, encrypts the report, and uploads it to Apple. The tracker's owner then queries the network and decrypts the location. The owner of the relaying phone never knows it happened.
The crowd-sourced model is genuinely well-engineered for owner privacy: location reports are end-to-end encrypted so that even Apple cannot read them. But that same encryption means the system has no central view to flag "this tag is following a person who doesn't own it." The privacy that protects the owner also shields a stalker.
The Stalking Problem
Because these networks are dense — hundreds of millions of relay devices — a planted tracker can be located with surprising precision in any populated area, updating as the victim moves. Reported misuse has included tracking partners and ex-partners, following vehicles, and monitoring people's movements without consent. The harm is real enough that several jurisdictions have opened investigations and lawsuits, and manufacturers have been forced to add anti-stalking countermeasures they did not originally ship with.
A tool that finds your keys and a tool that follows a person are, at the hardware level, the same device. The only difference is consent — and consent is precisely what an unwanted tracker removes.
The Cross-Platform Detection Standard
Early anti-stalking features had a glaring hole: Apple's "unknown AirTag" alerts only worked for iPhone users. An Android user being tracked by an AirTag got no warning at all. After public pressure, Apple and Google jointly developed an industry specification — "Detecting Unwanted Location Trackers" — that standardizes how trackers behave and how phones of both platforms detect them.
Under the standard, a separated tracker (one away from its owner) emits detectable behavior, and both iOS and Android can surface an alert that an unknown tracker is moving with you. Major tracker makers, including Tile, Chipolo, and others, agreed to align with the spec so that detection is no longer ecosystem-locked.
How to Detect a Tracker Following You
If you suspect you are being tracked, here is a concrete sequence. Note that an abuser with physical access is a serious threat — prioritize your physical safety and consider contacting a domestic-violence hotline or law enforcement, who can preserve evidence.
| Platform | What to use |
|---|---|
| iPhone | Automatic "Item Detected Near You" alerts are on by default. You can also trigger a manual scan and make a found tracker play a sound. |
| Android | Built-in "Unknown tracker alerts" in Settings > Safety & emergency (on Android 6.0+), plus a manual scan option. |
| Either | Free apps such as AirGuard (open-source) scan continuously and log nearby trackers over time, which is better at catching intermittent followers. |
If you find one
- Do not assume you can safely disable it yourself if you are in an abusive situation — the tracker going dark may tip off the person tracking you.
- An AirTag's serial number and the phone number of its owner (in some cases) can be retrieved by holding it to an NFC-capable phone — useful evidence for police.
- Physically, most trackers can be silenced by removing the coin-cell battery: twist or pry open the housing.
- Document everything — photos, locations, timestamps — before acting.
The Broader Pattern
Bluetooth trackers are one instance of a larger trend: consumer convenience features that double as surveillance infrastructure. The same logic appears in location data brokers who buy and sell phone movement data, in stalkerware apps installed covertly on a target's phone, and in cross-device tracking that links your identity across screens. None of these were built to harm — and all of them can.
Defending against physical-world tracking is different from defending your communications, but the mindset is the same: understand the mechanism, know what it can and cannot see, and use the detection tools available. Threat modeling applies as much to a tracker in your bag as to an adversary on the network.
Where Haven Fits
Haven secures your messages and email, not your physical movements — no app can protect you from a device planted in your coat. But the values are continuous. The reason a finding network can be abused is the same reason we care about metadata: location and association data are as sensitive as content, and systems should be designed assuming they will be misused. If you are coordinating around a safety situation, doing it over end-to-end encrypted channels keeps the conversation itself private while you handle the physical threat.