Loxation Technical Whitepaper

4. Privacy Architecture and Unlinkability Provisions

This document describes how Loxation achieves strong, cryptographically enforced privacy and unlinkability while preserving authenticated device identity and secure group messaging.

4.1 Overview

Loxation is designed around a foundational principle:

Users must be discoverable only in the moment, without creating lasting digital traces in the physical world.

This section describes the Loxation design to achieve strong, cryptographically enforced privacy and unlinkability while still providing authenticated device identity, secure transport, and trustworthy group membership. Loxation is designed to accomplish this through a strict separation of identities, ephemeral cryptographic primitives at the BLE layer, and authenticated session establishment using App Attest, Play Integrity, and MLS.

The resulting system is designed such that no component—neither Loxation itself, nor passive BLE scanners, nor adversarial mesh participants—can use Loxation’s discovery mechanisms to track a user’s movements, infer social patterns, or correlate presence across contexts.


4.2 Threat Model

Loxation’s privacy architecture is informed by realistic threats arising in environments where BLE communication is used. The primary adversaries include:

Passive Observers

Actors capable of scanning BLE advertisements in public spaces (e.g., retail stores, vehicles, public kiosks, hobbyist scanners). These observers:

Active Local Attackers

Devices in physical proximity capable of:

Curious-but-Non-Malicious Infrastructure

Networked systems such as access points, scanning gateways, or analytics platforms that log BLE presence data by default.

Malicious Mesh Participants

Nodes that join the BLE mesh but attempt to correlate encrypted traffic metadata.

Crucially, because BLE communication is strictly short-range, MITM attacks are significantly less practical than passive tracking attacks. For Loxation, movement correlation and identity leakage are the primary privacy threats.


4.3 Privacy Design Principles

The Loxation privacy architecture is anchored by four complementary principles:

Principle 1 — No Persistent Identifiers in BLE

No long-lived identifier is ever placed in BLE beacons or negotiable handshake packets, including:

This eliminates the dominant risk of long-term correlation and physical movement profiling.

Principle 2 — Ephemeral Cryptographic Primitives at the Radio Layer

All broadcast cryptographic material (e.g., Noise static public keys) is:

This ensures that passive observers cannot correlate two BLE sessions as coming from the same device, even over short time intervals.

Principle 3 — Strong Identity Only Inside Encrypted Channels

Device identity, user identity, and membership credentials are never exposed except:

Identity flows upward—never outward.

Principle 4 — Separation of Discovery and Identity

BLE supports anonymous device discovery.

MLS, App Attest, and Play Integrity support authenticated identity.

The two layers are bridged only after the encrypted Noise channel is established. They never leak into each other.


4.4 BLE Layer Privacy: Ephemeral Discovery Identity

BLE advertisements are unencrypted by design. Any data placed in an advert can be passively collected and correlated indefinitely. To prevent physical-world tracking, Loxation uses:

4.4.1 Ephemeral Noise Static Keys

Each BLE advertisement carries an ephemeral Noise static public key, regenerated:

Benefits:

4.4.2 No Broadcast Device IDs

Loxation never includes:

in any BLE advertisement or pre-handshake payload.

4.4.3 BLE Address Privacy

BLE Resolvable Private Addresses (RPAs) are enabled and rotated in sync with the Noise ephemeral keys, ensuring:

This dual-rotation creates a strong anonymity set even in highly instrumented environments.


4.5 Secure Session Establishment

Once two Loxation nodes detect each other via ephemeral adverts, they initiate a Noise-based handshake optimized for privacy:

4.5.1 Noise Handshake With PSK Authentication

Loxation employs Noise NNpsk0/NNpsk2 patterns where:

The handshake provides:

4.5.2 DeviceId Only Revealed After Encryption

A stable deviceId—required for MLS membership, server-side authorization, and state continuity—is transmitted:

This ensures:

4.5.3 Periodic Rekeying

Noise symmetric keys are rekeyed every:

This ensures:


4.6 Identity Layer: MLS and Attestation

After the encrypted Noise tunnel is established:

4.6.1 App Attest / Play Integrity

Used to:

Attestation proofs never leave the encrypted channel.

4.6.2 MLS Identity

User and group identities are expressed via MLS keys.

These identities are:

By design, MLS identity is only usable inside fully encrypted channels.


4.7 Privacy Guarantees

Loxation’s design provides the following guarantees:

4.7.1 Unlinkability

Two BLE sightings cannot be determined to originate from the same device—even with perfect BLE logs.

4.7.2 Anti-Tracking

No persistent identifier is exposed:

4.7.3 Forward Secrecy

Compromise of a single session does not reveal past movement or past rendezvous.

4.7.4 Resistance to Social Graph Inference

Because no stable identifiers ever appear in public broadcasts, adversaries cannot:

4.7.5 Privacy-Preserving Discovery

Users remain visible only in real time and never leave residual identifiers that persist beyond the local encounter.


4.8 Summary

The Loxation privacy architecture provides:

This architecture allows Loxation to deliver authenticated, trustworthy communication and discovery without sacrificing physical-world privacy, making it one of the first systems to combine strong attestation with real-time anonymity and movement unlinkability.