Find my Hacker: how Apple's Network May be a Possible Tracking Tool
페이지 정보
작성자 Emmett 작성일25-09-20 08:07 조회3회 댓글0건관련링크
본문
George Mason University researchers recently uncovered a approach for hackers to trace the situation of practically any pc or cell device. Named "nRootTag" by the crew, ItagPro the attack uses a device’s itagpro bluetooth handle combined with Apple's Find My network to essentially flip target devices into unwitting homing beacons. Junming Chen, lead author iTagPro smart device of the study. The group of Qiang Zeng and Lannan Luo-both affiliate professors within the Department of Computer Science-and itagpro bluetooth PhD college students Chen and Xiaoyue Ma found the attack works by tricking Apple's Find My community into considering the target device is a lost AirTag. AirTag sends Bluetooth messages to close by Apple devices, which then anonymously relay its location by way of Apple Cloud to the proprietor itagpro bluetooth for tracking. Their assault methodology can flip a device-whether it's a desktop, smartphone, ItagPro or itagpro bluetooth IoT gadget-into an "AirTag" without Apple's permission, at which point the community begins monitoring. In experiments, itagpro bluetooth they have been capable of pinpoint a stationary pc's location to inside 10 ft, precisely track a shifting e-bike's route by a city, itagpro bluetooth and ItagPro even reconstruct the exact flight path and ItagPro determine the flight variety of a gaming console brought onboard an airplane.
Zeng gave an alarming example: "While it is scary if your good lock is hacked, it turns into way more horrifying if the attacker also knows its location. While Apple designs an AirTag to change its Bluetooth handle based mostly on a cryptographic key, an actor could not do that on other programs without administrator privileges. So as a substitute of trying to modify the Bluetooth handle, the researchers developed efficient key search techniques to find a key that is compatible with the Bluetooth deal with, making the key adapt to the tackle as a substitute. What makes nRootTag notably unsettling is a 90 p.c success price and the power to track units inside minutes. The technique does not require subtle administrator privilege escalation sometimes needed for such deep system access. Instead, it cleverly manipulates the Find My Network's trust in system signals, primarily turning Apple's helpful misplaced-device characteristic into an unwitting accomplice. The researchers demonstrated that the assault works broadly on computer systems and mobile devices operating Linux, Android, and Windows, in addition to several Smart TVs and VR Headsets.

Chen. They used tons of of graphics processing items (GPUs) to help find a match quickly, benefiting from the affordability in the current GPU rental panorama, where folks rent out idle GPUs for credits, pushed by previous mining traits and the present AI growth. Chen explained that not like Bitcoin mining where just one answer is saved, their mismatches will be saved to a database (referred to as a rainbow table) for future use, making it particularly effective for targeting hundreds of units simultaneously. Chen urged this technique could possibly be attractive to advertising companies seeking to profile users with out counting on device GPS. Most concerning are the privacy implications, as bad actors might easily abuse this system for stalking, harassment, company espionage, or threats to nationwide safety. The researchers really helpful to Apple that it replace its Find My community to raised verify gadgets, but a true fix may take years to roll out. The crew knowledgeable Apple of the issue in July of 2024 and Apple formally acknowledged it in subsequent safety updates, although they have not disclosed how they will patch the problem.
The outcomes obtained in laboratory exams, using scintillator bars read by silicon photomultipliers are reported. The current strategy is step one for designing a precision tracking system to be placed inside a free magnetized volume for the cost identification of low vitality crossing particles. The devised system is demonstrated able to supply a spatial resolution better than 2 mm. Scintillators, Photon Solid State detector, particle tracking gadgets. Among the deliberate activities was the development of a gentle spectrometer seated in a 20-30 m3 magnetized air volume, the Air Core Magnet (ACM). The whole design needs to be optimised for the dedication of the momentum and charge of muons in the 0.5 - 5 GeV/c range (the mis-identification is required to be less than 3% at 0.5 GeV/c). 1.5 mm is required contained in the magnetized air volume. On this paper we report the outcomes obtained with a small array of triangular scintillator bars coupled to silicon photomultiplier (SiPM) with wavelength shifter (WLS) fibers.
댓글목록
등록된 댓글이 없습니다.