Project Ghost Walk

Security & Ethical Concerns

Understanding the risks, limitations, and intended use of the Ghost Walk Privacy Shield.

Important Limitations & Risks

Legal Disclaimer

The code is intentional about being non-destructive and non-interfering. However, Ghost Walk operates by transmitting radio waves. Users are solely responsible for understanding and complying with all local radio frequency (RF) regulations, such as FCC Part 15 in the United States or equivalent standards (e.g., CE) in other jurisdictions.

False Sense of Security: A Tool for the Crowd

Ghost Walk is an obfuscation tool, not an invisibility cloak. It works best to confuse widespread surveillance by making real-time tracking of devices in a crowd difficult by flooding the airwaves with noise. This benefit is largely a public service, significantly helping the overall anonymity of a group (like at protests) rather than guaranteeing individual safety. It does not protect you from visual surveillance, facial recognition, cell-tower (triangulation) tracking, or passive monitoring of your mobile data usage. Relying on it for 100% personal anonymity is dangerous.

Who Should Use Ghost Walk?

  • Activists: Attending protests or high-risk gatherings where electronic surveillance is expected (to protect the CROWD not YOURSELF, the risks to the individual MAY outweigh the benefits, but the benefits to the crowd are significant).
  • Digital Privacy Enthusiasts: Individuals experimenting with and developing network security measures in controlled environments.
  • Concerned Citizens: People who frequent public areas (malls, transit hubs, city centers) with known commercial or state-level Wi-Fi tracking infrastructure.
  • Researchers: Students or academics studying the effectiveness of passive Wi-Fi tracking systems.

Who Should NOT Use Ghost Walk?

  • Anyone Near Critical Systems: Persons operating near airports, hospitals, military bases, or other sensitive infrastructure where RF interference is strictly prohibited.
  • People Requiring Legal Certainty: The project is experimental; if legal compliance must be 100% certain, do not use it until regulatory clarity is obtained.
  • Individuals Seeking Complete Anonymity: If your safety depends on being completely untraceable, a standalone ESP32 is insufficient.