Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WiFi Signals Map Human Activities, Raise Privacy Concerns

WiFi Signals Map Human Activities, Raise Privacy Concerns

Posted on March 9, 2026 By CWS

In a groundbreaking development, a novel open-source edge AI platform named π RuView is transforming conventional WiFi setups into advanced sensors capable of detecting human poses, vital signs, and movement patterns through walls without using cameras. This innovation presents significant privacy and surveillance challenges.

Revolutionizing Surveillance with WiFi

For years, experts have speculated about the potential of ambient radio waves for passive surveillance applications. This hypothesis has now evolved into a tangible solution. Developed by Reuven Cohen and available on GitHub, RuView employs WiFi DensePose technology, initially proposed by Carnegie Mellon University, to provide a cost-effective, edge-based system that maps human poses through walls using regular WiFi signals.

Technical Mechanics Behind the System

The system leverages Channel State Information (CSI) data, which WiFi devices naturally collect to enhance signal transmission. As individuals move within a wireless vicinity, these movements alter signal paths across several OFDM subcarriers. RuView captures these alterations at an impressive rate of 54,000 frames per second using Rust, processes amplitude and phase changes, and inputs them into an adapted DensePose-RCNN deep learning framework.

This sophisticated process enables real-time mapping of 24 body surface areas, including limbs, torso, and head, aligned with UV coordinates comparable to camera outputs but derived solely from RF signals. Concurrently, the system extracts vital signs: a bandpass filter at 0.1–0.5 Hz measures breathing rates, while 0.8–2.0 Hz filters monitor heart rate.

Implications and Security Concerns

One pressing issue is the minimal hardware requirement. RuView operates on ESP32 microcontrollers, each costing around $1, forming a sensor mesh network. With four to six nodes, the system offers comprehensive room coverage with sub-inch precision, operating independently of cloud services.

Through-wall detection is effective up to a depth of 5 meters using Fresnel zone theory and multipath models. The system gradually learns each room’s RF signature, isolating human motion and potentially identifying signal spoofing. With a latency of less than one millisecond, the system is fast and efficient.

Unlike cameras, which face stringent regulations like GDPR and CCPA, passive WiFi CSI sensing operates silently without needing direct access to the monitored environment. This lack of visibility raises significant legal and ethical questions.

Future Outlook and Recommendations

The potential abuse of this technology is straightforward: a malicious actor could discreetly install an ESP32 node within a shared area or adjacent to a WiFi access point, deploy RuView, and begin monitoring occupants’ movements and vitals clandestinely. Security experts should consider passive RF sensing as an emerging threat. Recommended countermeasures include implementing RF shielding in sensitive zones, monitoring network segments for unauthorized ESP32 devices, and advocating for regulatory measures to encompass CSI-based tracking before the technology advances beyond current policies.

Stay informed with our latest cybersecurity news by following us on Google News, LinkedIn, and X. Contact us for feature stories.

Cyber Security News Tags:AI, CSI, DensePose, human tracking, privacy concerns, Regulations, RF sensing, Security, Surveillance, WiFi technology

Post navigation

Previous Post: High-Value Windows RDS Exploit Surfaces on Dark Web
Next Post: Cyber Espionage Threatens Asian Infrastructure via Web Exploits

Related Posts

Sendmarc Appoints Dan Levinson as Customer Success Director in North America Sendmarc Appoints Dan Levinson as Customer Success Director in North America Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Cyber Security News
CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MacOS Vulnerability Exposed by ExifTool Flaw
  • Cyber Espionage Threatens Asian Infrastructure via Web Exploits
  • WiFi Signals Map Human Activities, Raise Privacy Concerns
  • High-Value Windows RDS Exploit Surfaces on Dark Web
  • Cisco SD-WAN Vulnerability Exploitation Grows Rapidly

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MacOS Vulnerability Exposed by ExifTool Flaw
  • Cyber Espionage Threatens Asian Infrastructure via Web Exploits
  • WiFi Signals Map Human Activities, Raise Privacy Concerns
  • High-Value Windows RDS Exploit Surfaces on Dark Web
  • Cisco SD-WAN Vulnerability Exploitation Grows Rapidly

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News