Project ideas from Hacker News discussions.

WiFi Could Become an Invisible Mass Surveillance System

📝 Discussion Summary (Click to expand)

Three dominant threads in the discussion

Theme What users said Representative quote
1. Technical limits vs. hype Participants repeatedly pointed out that the reported “image‑like” reconstructions are far from realistic, that the method needs a tightly‑controlled lab setting, and that accuracy drops sharply outside the experiment. “Resolution and positional accuracy are very poor. It’s more like ‘an approximate bag of water detector’.”brk
“The paper says, in a somewhat contrived scenario, with dozens of labelled walkthroughs per person, they can identify that person from their gait based on CSI and other WiFi information.”avidiax
“The results for CSI can also be found in Figure 3. We find that we can identify individuals based on their normal walking style using CSI with high accuracy, here 82.4 % ± 0.62.”mhitza
2. Privacy & surveillance concerns Many users expressed alarm that Wi‑Fi sensing could be used by ISPs, governments, or private firms to track people’s movements, sleep patterns, or presence without consent. “It feels rather more than a little bit creepy to realize that Comcast et al, and thus the US government, knows if you’re sleeping and knows if you’re awake.”fragmede
“Modern phones connect with a randomized MAC address. So yes, you can track a person around, but you will need another system (like the Wi‑Fi login page) to match MAC to identity.”avidiax
“I wonder how that would be at scale, with a few millions people. I’m don’t think that would remain as accurate.”elias_t
3. Comparison to existing tech & skepticism Commentators compared Wi‑Fi sensing to cameras, microphones, and existing presence‑detection features, arguing that the hype over “images” is misleading and that the technology is already in commercial products. “All of these stories using Wi‑Fi to detect things with high accuracy are just extreme machine‑learning demos.”Aurornis
“The devices that reported BFI information were also stationary, and there were no extra devices transmitting information that would be conflicting.”sponaugle
“It’s a turnkey function for any modern managed Wi‑Fi system right now.”josefritzishere

These three themes—technical feasibility, privacy implications, and the reality versus hype debate—capture the bulk of the conversation.


🚀 Project Ideas

Generating project ideas…

WiFi CSI Detector

Summary

  • A lightweight software tool that passively listens to WiFi traffic, identifies CSI/ BFI packets, and alerts users when their router or nearby routers are emitting data that could be used for gait or presence detection.
  • Provides a clear, real‑time dashboard showing which access points are sending CSI/ BFI, enabling users to take action (e.g., change firmware, block traffic, or install a shield).

Details

Key Value
Target Audience Home users, privacy advocates, small business owners
Core Feature Passive WiFi packet sniffing, CSI/ BFI detection, real‑time alerts
Tech Stack Python/Go, libpcap, Wireshark dissector, Electron/React UI
Difficulty Medium
Monetization Hobby

Notes

  • HN commenters expressed concern: “If you can do that you can infer when someone is home or away.” This tool gives them a way to verify if that’s happening.
  • Practical utility: Users can quickly see if their ISP’s Xfinity WiFi motion detection is active or if a neighbor’s router is broadcasting CSI data.
  • Sparks discussion on the feasibility of passive WiFi surveillance and how to detect it.

WiFi Privacy Shield

Summary

  • A small, plug‑in hardware device (USB or WiFi repeater) that injects controlled noise or jamming into the 2.4 GHz/5 GHz bands to obfuscate CSI/ BFI signals, making it difficult for passive surveillance systems to extract useful data.
  • Includes a simple web interface to enable/disable shielding, monitor signal strength, and log activity.

Details

Key Value
Target Audience Privacy‑conscious homeowners, small offices
Core Feature Noise injection, selective jamming, user‑controlled shielding
Tech Stack ESP32/STM32, RF transceiver, web UI (Node.js), OTA firmware
Difficulty Medium‑High
Monetization Revenue‑ready: one‑time purchase + optional subscription for firmware updates

Notes

  • Addresses the frustration: “Could become” and “What happens if you want to do advanced sensing…”. The shield directly counters the technique.
  • Users can test the effectiveness by running the WiFi CSI Detector before and after enabling the shield.
  • Encourages conversation about hardware‑level privacy defenses versus software patches.

OpenWrt Privacy Patch

Summary

  • An open‑source firmware patch for popular routers (e.g., TP‑Link, Netgear, Asus) that disables beamforming feedback, CSI extraction, and other WiFi‑based sensing features by default.
  • Adds a privacy‑settings page in the router’s web UI to toggle advanced sensing features on or off.

Details

Key Value
Target Audience Router owners, network administrators
Core Feature Disable CSI/ BFI, privacy‑settings UI, firmware updates
Tech Stack OpenWrt, UCI, Lua, shell scripts
Difficulty Medium
Monetization Hobby

Notes

  • Responds to comments: “What happens is that a large body of water…”. By disabling the underlying feature, the risk is mitigated at the source.
  • Practical for users who cannot replace hardware but want to reduce surveillance vectors.
  • Likely to spark discussion on router firmware security and privacy defaults.

Read Later