Skip to content
Home » The Spooky Technology Behind Apples Find My Device technology device

The Spooky Technology Behind Apples Find My Device technology device

In this video I explain the spook technology behind apples find my device that allows missing iphones, ipads, and apple watches to be found through a …

Images related to the topic technology device

The Spooky Technology Behind Apples Find My Device

The Spooky Technology Behind Apples Find My Device

Search related to the topic The Spooky Technology Behind Apples Find My Device

#Spooky #Technology #Apples #Find #Device
The Spooky Technology Behind Apples Find My Device
technology device
See all the latest ways to make money online: See more here
See all the latest ways to make money online: See more here

See also  RAS - A New Technology For Indoor a new technology

31 thoughts on “The Spooky Technology Behind Apples Find My Device technology device”

  1. okay… so hypothetically if i own an iphone, and i always have wifi and bluetooth off (not just disconnected) and i have find my off on all my devices, theoretically would my phone still be pinging location constantly? is it using gps to do this then? or is it still using bluetooth and wifi even if they are switched completely off? or am i "safe"

  2. This video contains a lot of misinformation.

    3:30: Yes, you can opt out of it. You can disable "Find My Network" in the Settings app.

    4:30: The same researchers here fully reverse-engineered the offline finding (Find My Network) protocol for the OpenHaystack project; this is how I know the rest of the info.

    4:45: You can prevent Apple from tracking you as the uploaded locations are fully encrypted with the public key broadcasted in the bluetooth beacon signal, which means that Apple can't read the location. This has the side effect of anyone being able to pull that information, but if it's pulled by anyone other than the legitimate owner it's useless because it's encrypted. The broadcasted public key also rotates to prevent nearby people from tracking a device by its public key.

    5:00: "Since the design is not open source, the answer is pretty much, trust Apple." You should never fully trust proprietary code that you can view. However, the fact that it's been thoroughly reverse engineered makes it slightly more trustworthy.

    5:55: Timmy's list of pseudonyms are infinitely long and continuously generated via a shared secret that isn't ever broadcasted. This is the "rotating public key" I talked about earlier.

    6:30: No, there's not a separate pseudonym and public key. Timmy and Ruth share public keys and he just broadcasts the public key and some information to go along with it.

    6:35: "Encrypts it with Apple's public key:" this is incorrect. It's directly encrypted with Ruth's key, not Apple's, so Apple can't view it.

    6:40: "Ruth sends in her list of pseudonyms:" this is incorrect, Ruth sends in the most recent public keys Timmy has broadcasted.

    6:45: "Apple verifies if they're correct" this is not true: Apple can't read it and doesn't do any authentication whatsoever. It relies on the fact if a person other than the device owner pulled it, they wouldn't have the key necessary to decrypt it, so they'd get a bunch of nonsensical garbled data because it's encrypted.

    7:00: "We are putting a whole lot of trust into Apple:" not true, Apple does nothing other than host garbled information. They can't read it. The only trust you put into Apple is that they don't indiscriminately delete everyone's info to prevent people from finding it or possibly gathering lists of public keys and then sending incorrect information. I guess it's theoretically possible for them to figure out where Lassie goes, but there are wayyyy easier ways to do that (through Apple Location Services or the cell towers). They could leak the database of missing devices, but that wouldn't cause much damage because it's encrypted using the OWNER's key, NOT Apple's.

  3. This is actually a super great technology because it hardly makes you any more tractable if you are already carrying an iPhone with you and it really helps you find lost items.

  4. Every point you brought up has already been addressed by Apple?

    They're using unique one-time identifiers and they're encrypting all traffic.

    I agree on the fact that security through obscurity is not the best of approaches.

  5. I experienced this when I sent my iPhone via the mail for repair, it was pretty cool to follow it through its journey on findmy. I think it only had Bluetooth and wifi turned on, and no SIM card and I would get fairly frequents updates.

  6. Apple or Iphone and all Apple Hardware is Proprietary, It is Founded by Trade Secrets and intellectual property

    By the Laws, i set for myself Proprietary Hardware and Software Must be Dead.
    Go for Libram 5, It's Open Source Hardware and they share Their Schematics and Bored Design Files.

    You just need the machinery to build it, and you don't need to trust anyone.

  7. I don’t why security minded people would find it a concern that their phones are reporting stolen or lost devices. Unless they are fine with stealing.

  8. “Like Bluetooth and airtags” well I mean, I guess that we’ve been waiting 2 years for nothing Because apparently they’re already built into our devices

  9. Find my iPhone originally doesn't work by locating via cell towers. It connects to your iPhone via either mobile data or wifi and sends the phone's gps location to iCloud. At 1:35 you also say AirTags instead of AirDrop. AirTags aren't released yet and AirDrop has nothing to do with locating devices. The only connection is that it's using wifi and bluetooth to transfer data between devices.

  10. This system seems fairly competently designed, going off what you mentioned. Lots of key verification, in the correct order is good. First of all, having a list of randomized keys for the reporting device is definitely a good idea. Anything that works like a remote should have rolling codes. The fact the participating relay device uses a randomized identity is also good, as this limits the extent of usability if the data is leaked, without a massive correlation being run on the data set. Encrypting with standard pubkey encryption before sending it to Apple is expected, this isn't 2004 and HTTP/1.1. The fact that the searching device requesting the coordinates has it's identity verified before they are sent to it is also a good measure. Yes, Apple needs to make sure their servers are continuously searched for exploits, but it means there's a 2FA-like system in place, which greatly improves security. Overall, based on this video, I would trust this system, on a 'necessary evil' basis, because recovering a lost device is worth the slight reduction in privacy it causes. Plus, I find grid networks to be a cool concept in general.

  11. Now is a sport to críticize google and apple without any real proof of what they are talking about, just a few people really explains how things happen in real time and what data is leaked to big tech companies, regularly YouTubers like this channel just talk and talk about privacy and stuff like that but they don’t have real information, they can’t see the difference between secure and private. If you want privacy you need to live like master roshi

  12. Simply put example in fine with MD collecting data on what food i buy to not over buy or under buy minimize waste keeping prices low

    What’s happening with some companies are figuratively saying put a gps on the car when you leave md and see what they buy at dicks and h&M ect

  13. How did you go about making this entire video not knowing that you can turn this feature off independently of find my iPhone. The whole find my network thing was added not that long ago

Leave a Reply

Your email address will not be published.