<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Peanut Politician: Technology]]></title><description><![CDATA[Technical analysis of surveillance, privacy, and emerging technology, grounded in peer-reviewed research and examined against the current state of federal law and constitutional doctrine.]]></description><link>https://www.peanutpolitician.com/s/technology</link><image><url>https://substackcdn.com/image/fetch/$s_!wPIf!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1a3543a-0e8b-4ae1-9ef0-a7352d1c66ea_500x500.png</url><title>Peanut Politician: Technology</title><link>https://www.peanutpolitician.com/s/technology</link></image><generator>Substack</generator><lastBuildDate>Mon, 13 Apr 2026 08:48:26 GMT</lastBuildDate><atom:link href="https://www.peanutpolitician.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ross]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[peanutpolitician@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[peanutpolitician@substack.com]]></itunes:email><itunes:name><![CDATA[Ben]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ben]]></itunes:author><googleplay:owner><![CDATA[peanutpolitician@substack.com]]></googleplay:owner><googleplay:email><![CDATA[peanutpolitician@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ben]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Your Walls Are No Longer Walls]]></title><description><![CDATA[A piece of open-source software can map your body through them using only WiFi signals. No federal law prohibits it.]]></description><link>https://www.peanutpolitician.com/p/your-walls-are-no-longer-walls</link><guid isPermaLink="false">https://www.peanutpolitician.com/p/your-walls-are-no-longer-walls</guid><dc:creator><![CDATA[Ben]]></dc:creator><pubDate>Tue, 24 Mar 2026 05:37:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S9Kn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On March 8, 2026, Sam Bent, who posts on X as @DoingFedTime, was asked whether a Yagi antenna would stop the through-wall WiFi sensing software that had just gone viral on GitHub.<sup>1</sup> His answer: &#8220;Not having wifi does.&#8221; When pressed, he added: &#8220;The attacker brings the router. You just have to be inside the signal path. I&#8217;ve never done this, so it&#8217;s an assumption.&#8221;</p><p>The first of those statements identifies a technical reality that the subsequent sections of this article document in detail: the target of CSI-based sensing does not need to own or operate any WiFi device, because the attacker supplies the transmitting hardware. The qualifying statement, that Bent had never personally deployed the technique, is worth noting precisely because the question is not whether any particular individual has done it. The question is whether the law has anything meaningful to say when someone can reconstruct a person&#8217;s body position, breathing rate, and heart rate from the other side of a wall, using hardware that costs $30, produces no detectable emission, and captures no image that any existing statute was written to address.</p><p>The answer, examined against the current state of federal law and constitutional doctrine, is almost nothing.</p><h1><strong>What WiFi DensePose Actually Does</strong></h1><p>In December 2022, researchers Jiaqi Geng, Dong Huang, and Fernando De la Torre at Carnegie Mellon University&#8217;s Human Sensing Laboratory completed a paper titled &#8220;DensePose From WiFi,&#8221; subsequently posted to arXiv as a preprint and submitted as a master&#8217;s thesis to the CMU Robotics Institute (arXiv:2301.00250).<sup>2</sup> The paper described a deep neural network that maps the phase and amplitude of WiFi signals to UV coordinates across 24 regions of the human body, reconstructing full-body human pose in real time, through walls, without a camera.</p><p>The mechanism is a property of WiFi signals called Channel State Information, or CSI. CSI is not the data transmitted over a network. It is a measurement of how the signal traveled from transmitter to receiver, capturing amplitude and phase across dozens of individual frequency channels called subcarriers. A human body moving through a room disturbs those signal paths in ways that are consistent, measurable, and recoverable. A neural network trained on those disturbances can determine where a person is, how they are positioned, and whether their chest is rising and falling.</p><p>In early March 2026, a developer known as Reuven Cohen released an open-source implementation of the technique under the name RuView, also known as WiFi DensePose, on GitHub under an MIT license.<sup>3</sup> The repository reached the top of GitHub&#8217;s trending lists within days.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S9Kn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S9Kn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 424w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 848w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S9Kn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png" width="1456" height="789" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:789,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S9Kn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 424w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 848w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!S9Kn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04061781-8e08-4b40-94f7-c0cf92ab1b85_1920x1040.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><em>Figure 1. CSI-based through-wall human sensing at two capability levels. Left: the attacker deploys a WiFi transmitter and ESP32 receivers in an adjacent unit. Center: the CMU lab demonstrated a 24-region dense body surface map using research hardware (arXiv preprint, not peer-reviewed). Right: commodity ESP32 hardware, validated in peer-reviewed literature, produces a 17-keypoint skeleton with vital sign monitoring and has demonstrated through-wall activity recognition at 18.5 meters. The comparison table distinguishes what each capability level has actually demonstrated.</em></p><h1><strong>What It Actually Requires, and Why That Matters</strong></h1><p>Popular coverage has repeatedly misreported a critical technical distinction: a standard home router cannot perform this sensing. The GitHub repository states it directly. Full CSI-based pose estimation, vital sign monitoring, and through-wall detection require hardware that exposes per-subcarrier amplitude and phase data. Standard consumer WiFi equipment does not. The repository&#8217;s own documentation notes that consumer laptops &#8220;can only provide RSSI-based presence detection, which is significantly less capable.&#8221;<sup>3</sup></p><p>What does work is an ESP32-S3 microcontroller, a commodity chip available from consumer electronics retailers for approximately $8 to $30. A functional sensing mesh requires three to six nodes plus a transmitting router; a documented starter configuration costs approximately $54 total. Alternatively, an Intel 5300 network interface card ($15 used, with modified firmware) or a Qualcomm Atheros AR9580 ($20 used, with kernel patches) can perform the same function.<sup>4</sup></p><p>Peer-reviewed literature places the effective sensing range for commodity CSI hardware at approximately six to eight meters within a single room.<sup>5</sup> Through-wall performance degrades with distance, but peer-reviewed research using ESP32-S3 hardware combined with a directional biquad antenna has demonstrated activity recognition across 18.5 meters spanning five rooms separated by 25-centimeter brick walls.<sup>6</sup> A standard residential wall between adjacent units falls well within that range.</p><p>The Yagi question that prompted Bent&#8217;s response has a precise answer. A Yagi is a directional antenna that improves signal gain in one direction; it is relevant to transmitting or receiving radio signals, not to defending against sensing. CSI-based detection does not intercept data packets. It reads the physics of how radio waves scatter off a human body. WPA3 encryption is equally irrelevant: CSI operates at the physical layer of the radio signal, below the layer where any encryption is applied.<sup>7</sup> What Bent identified correctly, even as an assumption, is that the attacker introduces their own transmitting hardware into the signal environment. The target does not need to own or operate any WiFi device. They need only to be present inside the signal path.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cwjp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cwjp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 424w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 848w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 1272w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cwjp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png" width="1456" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cwjp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 424w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 848w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 1272w, https://substackcdn.com/image/fetch/$s_!Cwjp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9e53e66-6618-4867-8037-d66c3c9be5c4_1800x950.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><em>Figure 2. CSI operates at the physical layer (Layer 1) of the OSI model. Encryption protocols such as WPA3 protect payload data at Layer 2 and above. The amplitude and phase patterns of radio waves, which CSI reads, are unaffected by encryption.</em></p><p>One factual qualification is required before proceeding. The specific RuView/WiFi DensePose implementation has faced substantive criticism. Developers on Hacker News and GitHub identified code generating random CSI signals using np.random.rand() rather than actual hardware input, and alleged misrepresentation of cited research. Separate review flagged overnight inflation of the repository&#8217;s star count. The repository&#8217;s own audit log confirms that no real-world CSI dataset is bundled; the system runs on a synthetic reference signal.<sup>8</sup> The underlying Carnegie Mellon research is a different matter. The CMU paper is an arXiv preprint and master&#8217;s thesis, not a peer-reviewed publication, but CSI-based human sensing as a field has been validated across hundreds of academic studies, deployed commercially at scale, and formally standardized by the IEEE under 802.11bf, published in September 2025.<sup>9</sup> A two-year evaluation involving 280 edge devices across 16 real-world scenarios, processing more than four million motion samples, achieved 92.61% accuracy in diverse homes, and the resulting system now operates on over 100 million connected devices worldwide.<sup>9</sup> Whether this specific GitHub implementation performs as advertised is a question about one developer&#8217;s repository. Whether the underlying capability exists is not. It does.</p><h1><strong>Two Separate Legal Problems</strong></h1><p>WiFi DensePose presents two distinct legal questions requiring separate analysis. The first is what happens when a government actor deploys it. The second is what happens when anyone else does. The answers are different, and both are incomplete.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p0lH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p0lH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 424w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 848w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p0lH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png" width="1456" height="809" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:809,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p0lH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 424w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 848w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!p0lH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c95e1c-cc42-4d01-bbd1-450dfbc711fc_1800x1000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><em>Figure 3. The two-track legal analysis and the gaps within each track. For government actors, Kyllo and Carpenter provide constitutional grounds for requiring a warrant, but the &#8220;general public use&#8221; qualifier is unresolved and no statute specifically covers CSI sensing. For private actors, no federal statute prohibits it.</em></p><h2><strong>Track One: Government Actors</strong></h2><p>The Fourth Amendment stands, in the Supreme Court&#8217;s own formulation, most firmly at the threshold of the home. In <em>Silverman v. United States</em>, the Court declared that &#8220;[a]t the very core of the Fourth Amendment stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion.&#8221;<sup>10</sup> That principle has not weakened. Every major Fourth Amendment case addressing new surveillance technology in the decades since has returned to it.</p><p>The case that maps most directly onto WiFi DensePose is <em>Kyllo v. United States</em>, 533 U.S. 27 (2001). Federal agents used a thermal imaging device aimed at Danny Lee Kyllo&#8217;s home from a public street to identify heat patterns consistent with indoor marijuana cultivation. The Supreme Court, in a 5&#8211;4 opinion by Justice Antonin Scalia, held the surveillance was a Fourth Amendment search. The operative holding: where the government uses a device that is not in general public use to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a &#8220;search&#8221; and is presumptively unreasonable without a warrant.<sup>11</sup></p><p>The majority opinion was written deliberately to reach forward. The Court declined to limit the rule to thermal imaging and warned that restricting it would &#8220;leave the homeowner at the mercy of advancing technology, including imaging technology that could discern all human activity in the home.&#8221;<sup>11</sup> Justice Scalia was describing a hypothetical risk. That hypothetical is now a $54 hardware kit running open-source software.</p><p>WiFi DensePose does not detect heat radiating through an exterior wall. It reconstructs body position, breathing rate, and heart rate of individuals inside the home, information that is by any defensible measure more intimate than the thermal distribution <em>Kyllo</em> addressed. Applied by a court willing to take the long view the majority invited, the <em>Kyllo</em> framework would require a warrant before government deployment of this technology against a private residence.</p><p>The open legal question is <em>Kyllo</em>&#8217;s &#8220;not in general public use&#8221; qualifier. The ESP32-S3 is a chip sold at consumer electronics retailers for as little as $8. Whether hardware at that price point, paired with a software stack available on GitHub, satisfies that threshold is a question no court has yet resolved. It bears noting that the <em>Kyllo</em> majority did not define &#8220;general public use&#8221; with precision, and the phrase has generated significant scholarly debate in the quarter-century since. A thermal imager that attaches to a smartphone is now available for approximately $200. Whether the availability of a technology in principle, as opposed to its widespread actual deployment for surveillance purposes, is the relevant metric is itself an unresolved doctrinal question.</p><p>A second line of authority bears on continuous monitoring. In <em>Carpenter v. United States</em>, 585 U.S. 296 (2018), the Supreme Court held that warrantless government acquisition of 127 days of historical cell-site location data constituted a Fourth Amendment search. Chief Justice Roberts&#8217;s majority opinion held that &#8220;an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI.&#8221;<sup>12</sup> That holding was tied to cell-site location information specifically, but the reasoning extends naturally to CSI-based sensing, which captures a qualitatively different and more intimate category of data: not where a person traveled over a period of months, but how their body is positioned, whether they are breathing, and what their heart rate is, inside a private home, in real time. <em>Carpenter</em>&#8217;s logic, applied to that record, resolves in one direction.</p><p>The statutory gap remains even under this favorable constitutional reading. Title III of the Omnibus Crime Control and Safe Streets Act of 1968, codified at 18 U.S.C. &#167; 2510 <em>et seq.</em>, and the Foreign Intelligence Surveillance Act, 50 U.S.C. &#167; 1801 <em>et seq.</em>, were both designed around the interception of communications content. CSI-based sensing does not intercept communications. It reads radio wave physics. No court has ruled on whether existing statutory authority covers it.<sup>14</sup></p><h2><strong>Track Two: Private Actors</strong></h2><p>The Fourth Amendment constrains only government action. It says nothing about what private actors may do.</p><p>There is currently no federal statute in the United States that specifically prohibits WiFi-based covert human sensing.<sup>13</sup> The Federal Communications Commission&#8217;s statutory mandate centers on spectrum efficiency and interference prevention, not on restricting the information that can be extracted from an authorized transmission. The Electronic Communications Privacy Act of 1986 and Title III govern the interception of the contents of wire, oral, and electronic communications. CSI-based sensing does not intercept any communication. It reads the physical behavior of radio waves as they propagate through space and interact with a human body, operating below the layer that federal wiretapping law was written to address.<sup>14</sup></p><p>State law provides no consistent alternative. Some states have voyeurism or surveillance device statutes that courts might stretch to cover this conduct. None were written with through-wall CSI body mapping in mind, and most have not addressed it at all.</p><p>Any private actor who deploys an ESP32-S3 mesh and uses it to monitor body position, sleep patterns, and vital signs through a wall is operating in a legal space that existing law has not closed. The European Union&#8217;s General Data Protection Regulation classifies WiFi tracking identifiers as personal data, but CSI-based body pose extraction, which produces a real-time skeletal map of a specific individual inside a specific dwelling, has not been specifically addressed by regulators on either side of the Atlantic.<sup>15</sup></p><h1><strong>The Question the Law Has Not Answered</strong></h1><p>WiFi DensePose is not a camera. It captures no image. It produces no recording a person would recognize as surveillance footage. What it produces is a skeletal data structure, 17 body keypoints updated in real time, and a continuous stream of physiological readings. That output is invisible in the legal sense that matters most: no existing surveillance statute was written to reach it.</p><p>Traditional surveillance law was designed around evidence that maps onto statutory categories legislators anticipated. A camera produces an image. A listening device produces audio. A tracking device produces location data. CSI-based sensing produces none of them. The sensing apparatus produces no detectable emission of its own, though the hardware nodes that enable it must be physically deployed in the signal environment. The data it extracts is not something the subject ever chose to expose. It is recovered from the involuntary physics of a human body occupying a room, inside the space the constitutional order has always treated as the most protected.</p><p>In <em>Kyllo</em>, Justice Scalia wrote that the Court must &#8220;take the long view.&#8221;<sup>11</sup> In 2001, the technology before the Court could determine whether someone was running high-intensity grow lights. The technology commercially available in 2026 can identify which room a person occupies, whether they are standing or supine, whether they are breathing at a normal rate, and what their heart rate is, through a wall, without their knowledge, for $54 in hardware.</p><p>The gap between those two facts is not a technical gap. It is a legislative one. And it is, at present, open.</p><h1><strong>Endnotes</strong></h1><p><strong>1. </strong>Sam Bent (@DoingFedTime), posts on X, March 8, 2026. The first post (&#8220;Not having wifi does&#8221;) was published at 7:27 PM; the second (&#8220;The attacker brings the router&#8230;&#8221;) at 10:08 PM. Available at</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/DoingFedTime/status/2030827979996045627 and https://x.com/DoingFedTime/status/2030787589620326422.&quot;,&quot;full_text&quot;:&quot;<span class=\&quot;tweet-fake-link\&quot;>@glorymebloodbag</span> Not having wifi does.&quot;,&quot;username&quot;:&quot;DoingFedTime&quot;,&quot;name&quot;:&quot;Sam Bent&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1783833277993816064/5Og5BWwK_normal.png&quot;,&quot;date&quot;:&quot;2026-03-08T23:27:46.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:5,&quot;retweet_count&quot;:1,&quot;like_count&quot;:30,&quot;impression_count&quot;:885,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p><strong>2. </strong>Jiaqi Geng, Dong Huang, and Fernando De la Torre, <em>Dense Human Pose Estimation From WiFi</em>, CMU Robotics Institute Technical Report CMU-RI-TR-22-59 (August 2022); arXiv preprint arXiv:2301.00250 (submitted December 31, 2022). Available at https://arxiv.org/abs/2301.00250. This paper has not been published in a peer-reviewed journal or conference proceeding. It is a master&#8217;s thesis and arXiv preprint. It has been cited in subsequent peer-reviewed literature and forms the conceptual basis for the open-source implementation discussed in this article.</p><p><strong>3. </strong>RuView GitHub repository (formerly WiFi DensePose), developer Reuven Cohen (ruvnet), MIT License. Available at https://github.com/ruvnet/wifi-densepose. Docker images and Rust crates were published on March 1, 2026; the repository reached GitHub&#8217;s trending lists by approximately March 5, 2026. <em>See</em> AIToolly, &#8220;RuView: WiFi DensePose for Real-time Pose, Vitals, Presence,&#8221; March 5, 2026. The repository states: &#8220;CSI-capable hardware required.&#8221; The repository&#8217;s documentation claims deployment via Docker &#8220;in approximately 30 seconds.&#8221;</p><p><strong>4. </strong>On hardware costs: The RuView repository documents a starter kit of three to six ESP32-S3 nodes for approximately $54 total. Alternative CSI-capable hardware includes the Intel 5300 NIC ($15 used, with modified firmware) and the Qualcomm Atheros AR9580 ($20 used, with kernel patches). <em>See</em> Halperin et al., &#8220;Tool Release: Gathering 802.11n Traces with Channel State Information,&#8221; <em>ACM SIGCOMM Computer Communication Review</em> 41, no. 1 (2011): 53; Xie et al., &#8220;Commodity Wi-Fi-Based Wireless Sensing Advancements over the Past Five Years,&#8221; <em>Sensors</em> 24, no. 22 (2024): 7195, Table 11.</p><p><strong>5. </strong>On sensing range: Xie et al., <em>supra</em> note 4, available at https://pmc.ncbi.nlm.nih.gov/articles/PMC11597943/ (&#8220;The existing sensing range is usually just 6&#8211;8 m within a single room&#8221;).</p><p><strong>6. </strong>Julian Strohmayer and Martin Kampel, &#8220;WiFi CSI-Based Long-Range Through-Wall Human Activity Recognition with the ESP32,&#8221; in <em>Computer Vision Systems: ICVS 2023</em>, LNCS vol. 14253 (Springer, 2023), 41&#8211;50, https://doi.org/10.1007/978-3-031-44137-0_4. ESP32-S3 with 2.4 GHz biquad antenna; 18.5 meters across five rooms separated by 25 cm brick walls. Peer-reviewed conference proceedings.</p><p><strong>7. </strong>CSI operates at the Physical Layer (Layer 1) of the OSI model. Encryption protocols such as WPA3 protect payload data at Layer 2 and above. <em>See</em> Xie et al., <em>supra</em> note 5, Section 2; Ma et al., &#8220;WiFi Sensing with Channel State Information: A Survey,&#8221; <em>ACM Computing Surveys</em> 52, no. 3 (2019): Article 46.</p><p><strong>8. </strong>byteiota.com, &#8220;WiFi DensePose Hits GitHub #2: Real or AI-Generated Hype?&#8221; (March 2026), available at https://byteiota.com/wifi-densepose-hits-github-2-real-or-ai-generated-hype/. The repository&#8217;s own audit log (WITNESS-LOG-028) confirms: &#8220;Real-world CSI dataset bundled: No. Only synthetic reference signal (seed=42).&#8221;</p><p><strong>9. </strong>IEEE Std 802.11bf&#8482;-2025, published September 26, 2025. <em>See</em> https://standards.ieee.org/ieee/802.11bf/11574/. On large-scale deployment: &#8220;Experience Paper: Scaling WiFi Sensing to Millions of Commodity Devices,&#8221; arXiv:2506.04322 (June 2025): two-year evaluation, 280 edge devices, 16 scenarios, 4+ million motion samples, 92.61% accuracy. System now deployed on 100+ million devices. <em>See also</em> NIST, &#8220;IEEE 802.11bf: Enabling the Widespread Adoption of Wi-Fi Sensing,&#8221; https://www.nist.gov/publications/ieee-80211bf-enabling-widespread-adoption-wi-fi-sensing.</p><p><strong>10. </strong><em>Silverman v. United States</em>, 365 U.S. 505, 511 (1961).</p><p><strong>11. </strong><em>Kyllo v. United States</em>, 533 U.S. 27 (2001). Opinion by Scalia, J. Operative holding at 533 U.S. at 40. &#8220;Long view&#8221; language at 533 U.S. at 35&#8211;36. Available at https://supreme.justia.com/cases/federal/us/533/27/.</p><p><strong>12. </strong><em>Carpenter v. United States</em>, 585 U.S. 296 (2018). Opinion by Roberts, C.J. &#8220;[A]n individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI.&#8221; Slip op. at 11. The holding was tied to CSLI. Its extension to CSI-based sensing is the article&#8217;s analytical argument, not a direct application of the holding.</p><p><strong>13. </strong>No federal statute enacted as of March 2026 explicitly addresses or prohibits covert CSI-based human sensing. The FCC&#8217;s authority under 47 U.S.C. &#167; 301 <em>et seq.</em> centers on spectrum management, not information extraction. <em>See</em> 47 C.F.R. Part 15.</p><p><strong>14. </strong>Title III, 18 U.S.C. &#167; 2510 <em>et seq.</em> &#8220;Intercept&#8221; defined at &#167; 2510(4) as acquisition of &#8220;contents&#8221; of communications. CSI sensing does not acquire contents; it reads physical propagation characteristics. Whether courts would extend &#8220;contents&#8221; to cover physical-layer body sensing is unresolved. <em>See</em> Justice Manual &#167; 9-7.000, https://www.justice.gov/jm/jm-9-7000-electronic-surveillance.</p><p><strong>15. </strong>GDPR (Regulation 2016/679) Art. 4(1), Recital 30 (WiFi identifiers as personal data). Whether CSI-derived biometric data falls under Article 9 special categories is unresolved.</p>]]></content:encoded></item></channel></rss>