Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WiFi Signals Map Human Activities, Raise Privacy Concerns

WiFi Signals Map Human Activities, Raise Privacy Concerns

Posted on March 9, 2026 By CWS

In a groundbreaking development, a novel open-source edge AI platform named π RuView is transforming conventional WiFi setups into advanced sensors capable of detecting human poses, vital signs, and movement patterns through walls without using cameras. This innovation presents significant privacy and surveillance challenges.

Revolutionizing Surveillance with WiFi

For years, experts have speculated about the potential of ambient radio waves for passive surveillance applications. This hypothesis has now evolved into a tangible solution. Developed by Reuven Cohen and available on GitHub, RuView employs WiFi DensePose technology, initially proposed by Carnegie Mellon University, to provide a cost-effective, edge-based system that maps human poses through walls using regular WiFi signals.

Technical Mechanics Behind the System

The system leverages Channel State Information (CSI) data, which WiFi devices naturally collect to enhance signal transmission. As individuals move within a wireless vicinity, these movements alter signal paths across several OFDM subcarriers. RuView captures these alterations at an impressive rate of 54,000 frames per second using Rust, processes amplitude and phase changes, and inputs them into an adapted DensePose-RCNN deep learning framework.

This sophisticated process enables real-time mapping of 24 body surface areas, including limbs, torso, and head, aligned with UV coordinates comparable to camera outputs but derived solely from RF signals. Concurrently, the system extracts vital signs: a bandpass filter at 0.1–0.5 Hz measures breathing rates, while 0.8–2.0 Hz filters monitor heart rate.

Implications and Security Concerns

One pressing issue is the minimal hardware requirement. RuView operates on ESP32 microcontrollers, each costing around $1, forming a sensor mesh network. With four to six nodes, the system offers comprehensive room coverage with sub-inch precision, operating independently of cloud services.

Through-wall detection is effective up to a depth of 5 meters using Fresnel zone theory and multipath models. The system gradually learns each room’s RF signature, isolating human motion and potentially identifying signal spoofing. With a latency of less than one millisecond, the system is fast and efficient.

Unlike cameras, which face stringent regulations like GDPR and CCPA, passive WiFi CSI sensing operates silently without needing direct access to the monitored environment. This lack of visibility raises significant legal and ethical questions.

Future Outlook and Recommendations

The potential abuse of this technology is straightforward: a malicious actor could discreetly install an ESP32 node within a shared area or adjacent to a WiFi access point, deploy RuView, and begin monitoring occupants’ movements and vitals clandestinely. Security experts should consider passive RF sensing as an emerging threat. Recommended countermeasures include implementing RF shielding in sensitive zones, monitoring network segments for unauthorized ESP32 devices, and advocating for regulatory measures to encompass CSI-based tracking before the technology advances beyond current policies.

Stay informed with our latest cybersecurity news by following us on Google News, LinkedIn, and X. Contact us for feature stories.

Cyber Security News Tags:AI, CSI, DensePose, human tracking, privacy concerns, Regulations, RF sensing, Security, Surveillance, WiFi technology

Post navigation

Previous Post: High-Value Windows RDS Exploit Surfaces on Dark Web
Next Post: Cyber Espionage Threatens Asian Infrastructure via Web Exploits

Related Posts

Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins Cyber Security News
Threat Actors Using Stealerium Malware to Attack Educational Organizations Threat Actors Using Stealerium Malware to Attack Educational Organizations Cyber Security News
CrackArmor Flaws Expose Millions of Linux Servers to Risks CrackArmor Flaws Expose Millions of Linux Servers to Risks Cyber Security News
F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks Cyber Security News
Phishing Campaign Targets Microsoft Teams via Compromised Sites Phishing Campaign Targets Microsoft Teams via Compromised Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Cyber Scheme Exploits IT Jobs Globally
  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Cyber Scheme Exploits IT Jobs Globally
  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark