Apple: Airtag hacked, stalking said to be "frighteningly easy" to do

After various hardware modifications, an expert has now also been able to manipulate the software of the trackers. Moreover, stalking via the item trackers is "frighteningly easy".

Ten days after the official launch, security researcher Stack Smashing has managed to hack the accessory. He tweeted that he was able to break into the micro-controller and manipulate its software. The controller controls the device. For example, the German was able to change the NFC URL and make the item tracker open a different domain instead of the "find-my" website. A phishing page or similar could then be hidden behind it. Other specialists wonder about the fact that the firmware of the Airtags (test) is not encrypted. The hack is also called a jailbreak.

Airtag stalking too easy thanks to security weaknesses

Another report in recent days also criticized Apple's anti-stalking measures as inadequate. After testing them, Washington Post editor Geoffrey Fowler wrote, for example, "Airtags are a new tool for low-cost, effective stalking. [...] Apple's efforts are simply not enough." He had a colleague track his backpack for a day and described that it could find his whereabouts "with remarkable precision." The "stalker" also had his exact home address displayed, he said.

Turning off security alerts without identification.

There is criticism that three days is a long time to be tracked without your own knowledge. This time period only applies to Android users. During this time, a foreign stalker could have already tracked the target person to the home address or to another sensitive location. Furthermore, the speaker of the Airtags can be deactivated to bypass the acoustic warnings. In addition, the option in the associated app that turns off the warnings for a day is under criticism. It can be activated without having to enter a pin or other authentication. Critics are calling for the same pop-up warnings for Android users and a password or pin lock to turn them off.

Comments

Popular posts from this blog

Chrome targeted by criminals: Why users need to update quickly now

Face and voice recognition: Why TikTok wants to be allowed to collect biometric data in the USA

Microsoft Teams, Zoom, WebEx: Berlin authority warns against popular video systems