TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Apple AirTag hacked again – free internet with no mobile data plan

17 pointsby cyrksoftabout 4 years ago

4 comments

thih9about 4 years ago
The &quot;free internet with no mobile data plan&quot; seems a stretch, unless you consider the speed ok.<p>&gt; Bräunlein reported that he could send at about 20 bits&#x2F;second and receive at about 25 bits&#x2F;second, but that his hidden data “messages” took anywhere from a minute to an hour to arrive.
评论 #27168625 未加载
jean-maloabout 4 years ago
The blog post [0] of the researcher - which this article is based on<p>[0] <a href="https:&#x2F;&#x2F;positive.security&#x2F;blog&#x2F;send-my" rel="nofollow">https:&#x2F;&#x2F;positive.security&#x2F;blog&#x2F;send-my</a>
评论 #27166946 未加载
adolphabout 4 years ago
<i>If you mock up AirTag broadcasts using one and only one of those messages as a public key, and you send it many times to improve its chance of getting through, I can figure out which hidden message you sent by working out the SHA256 hashes of all possible 100 messages…</i><p>Would this be the equivalent of using a one time pad?
m3kw9about 4 years ago
How does one “..query Apple’s Find My servers for 32 different “public keys”?