ZeroTrace AirLeak
Common Workflows
Step-by-step recipes for the things people commonly want to do
Recipes for the most common things people do with AirLeak. Each recipe is a step-by-step walkthrough — copy the steps, follow along.
Recipe 1: Find an AirTag that may be following you
Goal: Determine if any tracker has been with you for hours.
- Connect AirLeak. Switch to Monitor.
- Take it with you through your normal day (commute, errands, etc.).
- At the end of the day, open Insights → Trackers.
- Look at the Multi-hour followers card.
- If empty: no trackers have been with you long enough to alert. You're clear.
- If non-empty: each entry is a tracker that triggered the alert.
- Click each one for the device detail.
- Check the linked-MACs list and observation count.
- Mark as own if it's yours, family's, or a known device.
- For unknown ones, see Tracker Detection → Catching a tracker that's following you.
Time: Run all day. 5 min review.
Recipe 2: Audit your own iPhone's privacy
Goal: See exactly what your iPhone broadcasts and reduce leaks.
- Connect AirLeak. Switch to Monitor.
- Open Devices → BLE.
- Search for your iPhone's name.
- Click the row to open detail.
- Check each section:
- Header — is the name personal? Rename in iOS Settings → General → About → Name.
- Apple state — note OS major version (current?), action codes (working as expected).
- Probed SSIDs — expand. Note any corporate, hotel, airport SSIDs you'd rather not broadcast.
- Open iOS Settings → WiFi → Edit. Forget networks revealed in the probed list that you don't need.
- Check Settings → General → AirDrop. Set to Contacts only if not already.
- (Optional) Mark the device as own in AirLeak.
Time: 15 minutes.
Recipe 3: Quick "who's around me" check
Goal: See what's nearby in a new space (hotel, conference room, AirBnB).
- Connect AirLeak. Switch to Monitor.
- Wait 60 seconds.
- Open Insights → Distribution. Read the class breakdown.
- Open Devices → BLE. Use filter chips to drill in:
- Trackers — anything left in the room?
- Smart Home — what's connected here?
- Phones — how many people are around?
- Open Devices → WiFi. Check the encryption posture of the local network.
Time: 5 minutes.
Recipe 4: Catch a stranger's network history
Goal: Understand what probe-requests reveal about people in a public space.
- Connect AirLeak in a public space (coffee shop, train station, conference).
- Switch to Monitor. Wait 5 minutes.
- Open Insights → Network leakage.
- Look at Top probed SSIDs. Each one is a network somebody nearby has joined.
- Click any SSID to see the devices that probed for it.
- Click any device to see its full probed-SSID set in detail.
Privacy reminder: This data is sensitive. Don't publish or share strangers' SSID histories. See Probe Analysis → Responsible practices.
Time: 10 minutes.
Recipe 5: Detect an evil-twin AP
Goal: Check if a network you trust is being impersonated.
- Connect AirLeak. Switch to Monitor.
- Wait 60 seconds.
- Open Devices → WiFi.
- Search for your network's SSID.
- If multiple BSSIDs appear with the same SSID:
- Click each.
- Compare encryption (legitimate is
WPA2-Enterprise→ rogue isWPA2-Personal?) - Compare vendor IEs (legitimate has Cisco/Aruba IEs → rogue is generic?)
- Open Alerts. Filter by
deauth_burst.- If it fired during your time in this space, that's another rogue-AP signal.
Time: 5 minutes.
Recipe 6: Watch your own iPhone's state in real time (demo)
Goal: Demonstrate to someone what their phone broadcasts.
- Connect AirLeak. Switch to Monitor.
- Open the target iPhone's device detail page.
- Pick up the iPhone. Watch the action chip change to
screen_on. - Lock the iPhone. Watch lock state become
lockedwithin 1–2 s. - Open Photos. Watch action become
photos_screen. - Make a call. Watch action go through
initiating_call_or_facetime→active_call_or_facetime. - End the call. Watch chip clear.
This is the most striking AirLeak demo — most people don't believe their phone broadcasts these states until they see it live.
Time: 5 minutes.
Recipe 7: Audit your home network's security
Goal: Confirm your home WiFi is set up securely.
- Connect AirLeak in your home. Switch to Monitor.
- Wait 60 seconds.
- Open Devices → WiFi.
- Find your network. Click for detail.
- Check:
- Encryption — should be at least
WPA2-Personal(ideallyWPA3-Personalor mixed) - MFP —
required(WPA3) orcapable(WPA2). NOToff. - WPS — should NOT be enabled (WPS-PIN is brute-forceable)
- BSS Load — number of associated stations. Higher than expected = someone using your network without permission?
- Country IE — should match your country
- Encryption — should be at least
- Fix any concerns by logging into your router admin and adjusting settings.
Time: 10 minutes.
Recipe 8: Capture a forensic record of an event
Goal: Save a verifiable record of what was around you at a specific time (for security research, legal documentation, or insurance).
- Connect AirLeak. Switch to Monitor.
- Open Sessions. Note the new session ID and start time.
- Capture for the duration of the event.
- Switch to Setup to finalize the session.
- Rename the session: e.g.
Office Break-in 2026-05-07 night. - Download JSON and Download summary from the session menu.
- Store the JSON file securely. The session ID is unique and includes capture-time metadata.
The JSON is a complete record — every device, event, alert, and heartbeat. Suitable for forensic submission.
Time: 1 minute setup + capture duration.
Recipe 9: Run a long overnight capture
Goal: Capture overnight without overflowing the unit's memory.
- Connect AirLeak. Switch to Monitor.
- Adjust settings for long-running:
airleak-throttle 2000 # double the throttle to reduce stream pressure airleak-channels 1,6,11 # only non-overlapping channels airleak-scan-window 50 # half-duty BLE to free memory headroom - Confirm the unit is plugged into a stable USB port (not battery).
- Leave the desktop app running on a screen-locked machine.
- In the morning, switch back to Setup to finalize the session.
The unit will run smoothly for 12+ hours with these settings even in a moderately dense environment.
Time: 2 minutes setup + overnight.
Recipe 10: Mark all your own devices
Goal: Tell AirLeak which devices are yours so future captures filter them out.
- Connect AirLeak. Switch to Monitor.
- Bring out every device you own that broadcasts BLE: phone, laptop, AirPods, watch, AirTags, smart speakers, etc.
- Wait 2 minutes for them to populate the device list.
- For each, click in the device list, then click Mark as own in the header.
- Add a note for each (
AirTag on keys,Daughter's iPhone). - Future captures will exclude these from
multi_hour_followerscoring and label them in the library.
Time: 15 minutes (one-time setup).
Recipe 11: Check encryption of every WiFi at a venue
Goal: Get a quick read on a venue's WiFi security posture.
- Connect AirLeak at the venue. Switch to Monitor.
- Wait 60 seconds.
- Open Devices → WiFi.
- Apply filter: Open networks. See if anything appears.
- Apply filter: WEP. See if anything appears.
- Apply filter: MFP off. See which APs lack MFP.
- Apply filter: With WPS. See which APs have WPS-PIN enabled.
- Open Alerts. Filter by severity ≥ Medium. See WiFi-related alerts (
wep_network_near,wpa_personal_only,deauth_burst, etc.).
Time: 5 minutes.
Recipe 12: Build a personal device library over time
Goal: Have AirLeak recognize your regular devices automatically.
- First few captures — switch to Monitor for ~1 hour each, in places you're regularly (home, office). Don't filter or change anything.
- After 5 sessions — open Insights → Library. You'll have ~50–200 devices.
- Mark your own — open detail, Mark as own, add notes. Spend 5–10 minutes on this.
- Label others —
family,coworker,unknownfor context. - From here forward — your captures recognize known devices instantly. Multi-hour-follower alerts only fire on truly new entities.
Time: Cumulative, but only ~20 minutes of marking once you have a few sessions.
These recipes are deliberately small. Each is one specific outcome. Pick the one matching your current goal, walk through it, then close the doc. Over time you'll memorize the workflows you use most.