
One Tech Tip: No more lost cats and dogs. Use tech to track your pet
LONDON (AP) — 'Have you seen the cats?'
That's a common refrain in my household because our two felines, Maple and Juniper, can venture outside through a flap in the backdoor. Like many other London house cats, they're free to come and go, roaming the surrounding backyards and beyond, equipped with microchips to identify them if they get lost.
If your cat likes to prowl outdoors for long stretches, or your dog has a tendency to run off, it can be distressing when they don't return as expected.
If you're worried about your furry friend's whereabouts, technology can help you keep tabs on them.
How pet tech works
Dedicated pet trackers are collar-worn devices that typically use GPS signals to pinpoint the location of the animal wearing them. They use a 4G cellphone signal or your home Wi-Fi connection to relay the position to a smartphone app.
There are many products on the market. Tractive, Jiobit and Pawfit are among brands that offer trackers for both dogs and cats. Devices for the latter are generally smaller and lighter.
Dog trackers with integrated collars are available from Fi and Whistle. PetTracer is a cat collar that uses both GPS and radio signals from a home base station. FitBark, also for dogs, has an Apple Watch app to monitor location and other activity.
Garmin has a range of GPS dog collars that work with handheld devices resembling walkie-talkies, but they're pricey and aimed at outdoors enthusiasts like hunters.
Phone signals
Most trackers let you designate a safe zone on a map, usually your house and surrounding area, and alert you if your pet has left it.
They usually operate on the 4G LTE spectrum commonly used by wireless carriers. It typically has the longest range of any cellular signal, said Andrew Bleiman, Tractive's executive vice president for North America.
That means strong connectivity in most of Europe and North America 'unless you're in a really far flung place like the middle of a national park,' Bleiman said.
What it costs
Exact price depends on brand and model. Most devices sell for less than $100. However, keep in mind you'll also have to pay a subscription fee for the cell service to function.
While that could cost $100 or more a year, for some pet owners it's worth the 'peace of mind,' Bleiman said.
Battery life
The collars usually have a built-in rechargeable battery but battery life varies. Most will be last at least two to three days before they need charging, and a lot longer in ideal conditions.
One big factor is signal strength. The battery will drain faster if the device has to work harder to pick up the GPS or connect to Wi-Fi. Some save power by not sending coordinates in the safe zone.
Other features
Like fitness watches for humans, pet tracking apps offer health and activity monitoring features. You can see how long your cat or dog has spent resting or exercising on a daily or hourly basis.
But be aware, a tracker is 'not going to keep your pet in the backyard,' Bleiman said. It will only 'alert you when they leave the virtual fence area that you set up.'
How to use it
This One TechTip was inspired by Maple, who once went AWOL for days. It turned out he was hanging out in a backyard 10 doors down the street. We only found out after the residents got hold of a pet microchip scanner to look up our contact details to let us know so we could retrieve him.
Tractive provided a loaner device to try. Using the included breakaway collar, we put it on Maple, who clearly didn't like it at first. He dashed out the back door and jumped through a hole in the fence.
Over the next day, I used the Tractive app to monitor his movements. It showed his travels back and forth onto various neighboring properties. He came back to rest for a few hours around midnight, went out to prowl again around 3 a.m, then came back after an hour to nap some more.
It was fascinating to see where he was spending his time. According to the app's 'heatmap,' one of Maple's favorite spots was the same backyard where we had to retrieve him previously.
Losing track
About 24 hours after I attached the Tractive collar on Maple, I noticed he was no longer wearing it. It had somehow come off.
If you can't find your pet's exact location, or the device gets lost, Tractive has a 'radar' feature to pinpoint it with your phone's Bluetooth. Other brands have similar features.
On the app's map, I could see it was in a nearby backyard and that I was getting closer because the circle was getting bigger. But I couldn't figure out where it was and, not wanting to disturb the neighbors, I gave up.
Bleiman recommends using a harness for cats that don't like collars, but I'm not convinced.
Microchips
It's common for cats and dogs to be implanted with microchips, with the details added to a database. That makes it much easier to reunite owners with lost dogs and cats, even if they've strayed hundreds of miles away or gone missing for years.
Pet microchips, about the size of a grain of rice implanted just below the skin, are legally required in some European countries. There's no federal law in the U.S., though some places like Hawaii now require them, so check with state or local authorities.
But there's some confusion about what microchips can do. Because they don't have a power supply, they can't be tracked in real time. Whoever finds your pet would need to take it to a vet or a shelter to can scan the device for contact details.
Air Tags and similar devices are another option
Many pet owners use Bluetooth trackers like Apple's Air Tags, Samsung's SmartTags or similar devices from Tile, Cube and Chipolo, which rely on low-power signals relayed by passing smartphones.
Bluetooth trackers have a range of 100 to 500 feet (30 to 150 meters), depending on the model. The batteries last for months if not longer, and there's no need to pay for a subscription.
However, they're not specifically marketed for pets. That hasn't stopped pet owners, judging from many recommendations they've posted in online forums.
Wednesdays
Columnist Jen Zoratti looks at what's next in arts, life and pop culture.
Chipolo advises that its round plastic trackers are only for 'in-house pets like house-trained cats and smaller dogs' and warns against using them on 'larger dog breeds and outdoor cats.'
Still, they can be a solution for some pet owners.
'Bluetooth is a totally reasonable solution if you're in a downtown urban core,' Bleiman said. 'But pets move fast. And if you're in a wooded park, or you're in a suburban area — let alone a more rural or wilderness area — it's pretty unlikely your pet is going to be close to a Bluetooth device.'
___
Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Winnipeg Free Press
3 hours ago
- Winnipeg Free Press
As Musk's ‘robotaxi' rollout approaches, Democratic lawmakers in Texas try to throw up a roadblock
NEW YORK (AP) — A group of Democratic lawmakers in Texas is asking Elon Musk to delay the planned rollout of driverless 'robotaxis' in the state this weekend to assure that the vehicles are safe. In a letter, seven state legislators asked Tesla to wait until September when a new law takes effect that will require several checks before autonomous vehicles can be deployed without a human in the driver's seat. Tesla is slated to begin testing a dozen of what it calls robotaxis for paying customers on Sunday in a limited area of Austin, Texas. 'We are formally requesting that Tesla delay autonomous robotaxi operations until the new law takes effect on September 1, 2025,' the letter from Wednesday, June 18, reads. 'We believe this is in the best interest of both public safety and building public trust in Tesla's operations.' It's not clear if the letter will have much impact. Republicans have been a dominant majority in the Texas Legislature for more than 20 years. State lawmakers and Republican Gov. Greg Abbott have generally embraced Musk and the jobs and investment he has brought to Texas, from his SpaceX rocket program on the coast, to his Tesla factory in Austin. The company, which is headquartered in Austin, did not responded immediately to a request for comment from The Associated Press. The law will require companies to secure approval from the state motor vehicles department to operate autonomous cars with passengers. That approval, in turn, would depend on sufficient proof that the cars won't pose a high risk to others if the self-driving system breaks down, among other reassurances. Companies would also have to file detailed plans for how first responders should handle the cars if there is a problem, such as an accident. The letter asked Tesla to assure the legislators it has met all the requirements of the law even if it decides to go ahead with the test run this weekend. The letter was earlier reported by Reuters. Musk has made the robotaxi program a priority at Tesla and a failure would likely be highly damaging to the company's stock, which has already tumbled 20% this year. Monday Mornings The latest local business news and a lookahead to the coming week. Musk's political views and his affiliation with the Trump administration have drastically reduced sales of Tesla, particularly in Europe, where Musk's endorsement of Germany's far-right Alternative for Germany party in February's election drew broad condemnation. Tesla shares bottomed out in March and have rebounded somewhat in recent months. Much of the rise reflects optimism that robotaxis will not only be deployed without a hitch, but that the service will quickly expand to other cities and eventually dominate the self-driving cab business. Rival Waymo is already picking up passengers in Austin and several other cities, and recently boasted of surpassing 10 million paid rides. In afternoon trading Friday, Tesla shares were largely unchanged at $320. ________ AP reporter Jim Vertuno contributed from Austin.


Toronto Sun
3 hours ago
- Toronto Sun
Sixteen billion passwords may have been stolen. Here's how to protect yourself
Published Jun 20, 2025 • 4 minute read A visitor looks at his phone at the Mobile World Congress 2024 in Barcelona, Spain, Feb. 27, 2024. Photo by Pau Venteo / AP A Lithuanian cybersecurity news outlet says it uncovered a leak of 16 billion passwords that may grant access to Apple, Google, Facebook accounts and more. This advertisement has not loaded yet, but your article continues below. THIS CONTENT IS RESERVED FOR SUBSCRIBERS ONLY Subscribe now to read the latest news in your city and across Canada. Unlimited online access to articles from across Canada with one account. Get exclusive access to the Toronto Sun ePaper, an electronic replica of the print edition that you can share, download and comment on. Enjoy insights and behind-the-scenes analysis from our award-winning journalists. Support local journalists and the next generation of journalists. Daily puzzles including the New York Times Crossword. SUBSCRIBE TO UNLOCK MORE ARTICLES Subscribe now to read the latest news in your city and across Canada. Unlimited online access to articles from across Canada with one account. Get exclusive access to the Toronto Sun ePaper, an electronic replica of the print edition that you can share, download and comment on. Enjoy insights and behind-the-scenes analysis from our award-winning journalists. Support local journalists and the next generation of journalists. Daily puzzles including the New York Times Crossword. REGISTER / SIGN IN TO UNLOCK MORE ARTICLES Create an account or sign in to continue with your reading experience. Access articles from across Canada with one account. Share your thoughts and join the conversation in the comments. Enjoy additional articles per month. Get email updates from your favourite authors. THIS ARTICLE IS FREE TO READ REGISTER TO UNLOCK. Create an account or sign in to continue with your reading experience. Access articles from across Canada with one account Share your thoughts and join the conversation in the comments Enjoy additional articles per month Get email updates from your favourite authors Don't have an account? Create Account Cybernews warns the data is 'a blueprint for mass exploitation' because it could give cybercriminals unprecedented access to information that can be used for account takeovers, identity theft and highly targeted attacks. Here's what we know about the leak so far and how people can protect themselves from its repercussions. What do we know about the leak? Cybersecurity experts are strongly speculating that the data was leaked through infostealers, said Robert Falzon, head of engineering at security software firm Check Point. Infostealers are pieces of malware users are duped into clicking on, which then install something on their computer, 'which just kind of sits and listens to the computer while you're typing things from the keyboard.' Your noon-hour look at what's happening in Toronto and beyond. By signing up you consent to receive the above newsletter from Postmedia Network Inc. Please try again This advertisement has not loaded yet, but your article continues below. The malware can detect when you're logging into an account and can copy whatever you've input to send it to a database of credentials hackers compile. 'As a result of that, we end up with these giant repositories on the dark net filled with lists and lists and lists of usernames and passwords and credentials that have been stolen from users all around the world and that are being bought and sold as commodities,' Falzon said. Is all this leaked data new? That's up for debate. Cybernews says 'the data is recent, not merely recycled from old breaches,' but others disagree. 'It's really hard to track the providence of all of it,' Falzon said, because some hackers package data together from several leaks to resell. The only way to figure out how new it is would be to obtain other leaks and cross compare the data. This advertisement has not loaded yet, but your article continues below. 'If hackers manage to get their hands on your password for Google, Apple, or Facebook, stealing your money and identity may be easier than taking candy from a three-year-old,' Ignas Valancius, head of engineering at cybersecurity company NordPass, said in a press release. That's because hackers use the logins they obtain for credential stuffing — a practice where criminals get access to accounts by inputting stolen login information into websites. If you reuse your passwords across several websites or services, it may mean a hacker can get into your bank account and steal money, your favourite retailer accounts and drain you of your loyalty points or even find your address and birthday and use it for identity theft, Falzon said. This advertisement has not loaded yet, but your article continues below. Figuring out if you've been a victim of the breach would take obtaining the data and searching through it for your credentials. Because only an 'extreme minority' of people have never been breached in general, Falzon said you're always best off assuming your info is part of the leak. What can Canadians do to protect themselves? Cybersecurity experts are unanimous in advising people to change their passwords regularly, especially after leaks to avoid becoming the victim of credential stuffing. But long before a breach happens, they say there are several things people can do to protect themselves. The most obvious is varying your passwords and avoiding reusing them. When you recycle passwords across several websites or services or make them easy to guess, it means hackers won't have much of a struggle accessing many of your accounts. This advertisement has not loaded yet, but your article continues below. Multifactor authentication can also offer a layer of security. When someone attempts to login to an account, it forces them to enter a code sent by email or text before they can get access. The process helps users thwart hacking attempts. I have so many accounts to keep track of and changing my passwords with every breach is making it hard to remember them all. What can I do? Some cybersecurity experts are fans of password managers. These services create strong, unique passwords for each account you have. Then, the manager stores them in an encrypted account you can quickly access anytime you need to enter a password. However, other experts argue password managers can have varying levels of encryption and warn that if the one you are using is breached, all of your passwords may be vulnerable. This advertisement has not loaded yet, but your article continues below. Many experts advise people to use passkeys, when possible. Passkeys are digital credentials able to unlock accounts with a mere flash of your face or fingerprint scan on your phone. They are considered to be more secure than passwords because there is no string of characters, numbers and symbols to memorize, making them harder to hack. They don't need to be changed, can't be stolen by someone guessing or peeking over your shoulder and there's no way to accidentally use one on the wrong website. Not all websites and services accept passkeys but several big players like Apple, Shopify, Microsoft, DocuSign and PayPal do. World Columnists World Toronto & GTA MMA


Winnipeg Free Press
9 hours ago
- Winnipeg Free Press
Pope Leo XIV flags AI impact on kids' intellectual and spiritual development
ROME (AP) — Pope Leo XIV warned Friday that artificial intelligence could negatively impact the intellectual, neurological and spiritual development of young people as he pressed one of the priorities of his young pontificate. History's first American pope sent a message to a conference of AI and ethics, part of which was taking place in the Vatican in a sign of the Holy See's concern for the new technologies and what they mean for humanity. In the message, Leo said any further development of AI must be evaluated according to the 'superior ethical criterion' of the need to safeguard the dignity of each human being while respecting the diversity of the world's population. He warned specifically that new generations are most at risk given they have never had such quick access to information. 'All of us, I am sure, are concerned for children and young people, and the possible consequences of the use of AI on their intellectual and neurological development,' he said in the message. 'Society's well-being depends upon their being given the ability to develop their God-given gifts and capabilities,' and not allow them to confuse mere access to data with intelligence. 'In the end, authentic wisdom has more to do with recognizing the true meaning of life, than with the availability of data,' he said. Leo, who was elected in May after the death of Pope Francis, has identified AI as one of the most critical matters facing humanity, saying it poses challenges to defending human dignity, justice and labor. He has explained his concern for AI by invoking his namesake, Pope Leo XIII. That Leo was pope during the dawn of the Industrial Revolution and made the plight of workers, and the need to guarantee their rights and dignity, a key priority. Toward the end of his pontificate, Francis became increasingly vocal about the threats to humanity posed by AI and called for an international treaty to regulate it. Francis said politicians must take the lead in making sure AI remains human-centric, so that decisions about when to use weapons or even less-lethal tools always remain made by humans and not machines. Sundays Kevin Rollason's Sunday newsletter honouring and remembering lives well-lived in Manitoba. ___ Associated Press religion coverage receives support through the AP's collaboration with The Conversation US, with funding from Lilly Endowment Inc. The AP is solely responsible for this content.