Book Image

Learning iBeacon

By : Craig Gilchrist
Book Image

Learning iBeacon

By: Craig Gilchrist

Overview of this book

Table of Contents (16 chapters)
Learning iBeacon
About the Author
About the Reviewers

Dispelling security myths

We already dispelled most of the common security myths in Chapter 1, Welcome to iBeacon, but I thought I'd just reiterate them so that you've got a complete vocabulary for your wary clients or users. Consider the following steps:

  • Beacons are tracking my location: Beacons aren't tracking your location. They're not doing anything at all except telling you they're nearby. They push data and don't receive data at all and what's more, most beacons your app comes into contact with don't even care that they are there.

  • Beacons are delivering targeted offers: Beacons aren't delivering anything except their UUID/major/minor triplet values. In order to deliver targeted offers, your app needs to know more about your habits and so ultimately needs your permission and some other understanding about you as a person.

  • Beacons can track me without my permission: Your mobile device will come in contact with beacons every day and as the technology gains momentum, your device will encounter...