“…Some of those attacks especially affect the implementation of contact tracing protocols (Ludant et al, 2021). Beyond address randomization, wireless devices can be fingerprinted based on hardware imperfection (Yan et al, 2022;Shen et al, 2021;Givehchian et al, 2022), but those attacks often require specialized hardware.…”