The Spooky Technology Behind Apples Find My Device technology device

by royajade123VGUYF

In this video I explain the spook technology behind apples find my device that allows missing iphones, ipads, and apple watches to be found through a …

Images related to the topic technology device

The Spooky Technology Behind Apples Find My Device

The Spooky Technology Behind Apples Find My Device

Search related to the topic The Spooky Technology Behind Apples Find My Device

#Spooky #Technology #Apples #Find #Device
The Spooky Technology Behind Apples Find My Device
technology device
See all the latest ways to make money online: See more here
See all the latest ways to make money online: See more here

Related Posts


Internet Username 29/09/2021 - 10:28 Chiều

okay… so hypothetically if i own an iphone, and i always have wifi and bluetooth off (not just disconnected) and i have find my off on all my devices, theoretically would my phone still be pinging location constantly? is it using gps to do this then? or is it still using bluetooth and wifi even if they are switched completely off? or am i "safe"

synthetic presence 29/09/2021 - 10:28 Chiều

The impact on battery life is virtually non existent, but you can disable your device participating.

Jessie A 29/09/2021 - 10:28 Chiều

You didn't mention how the police have access to your location data.

A. Owl 29/09/2021 - 10:28 Chiều

This video contains a lot of misinformation.

3:30: Yes, you can opt out of it. You can disable "Find My Network" in the Settings app.

4:30: The same researchers here fully reverse-engineered the offline finding (Find My Network) protocol for the OpenHaystack project; this is how I know the rest of the info.

4:45: You can prevent Apple from tracking you as the uploaded locations are fully encrypted with the public key broadcasted in the bluetooth beacon signal, which means that Apple can't read the location. This has the side effect of anyone being able to pull that information, but if it's pulled by anyone other than the legitimate owner it's useless because it's encrypted. The broadcasted public key also rotates to prevent nearby people from tracking a device by its public key.

5:00: "Since the design is not open source, the answer is pretty much, trust Apple." You should never fully trust proprietary code that you can view. However, the fact that it's been thoroughly reverse engineered makes it slightly more trustworthy.

5:55: Timmy's list of pseudonyms are infinitely long and continuously generated via a shared secret that isn't ever broadcasted. This is the "rotating public key" I talked about earlier.

6:30: No, there's not a separate pseudonym and public key. Timmy and Ruth share public keys and he just broadcasts the public key and some information to go along with it.

6:35: "Encrypts it with Apple's public key:" this is incorrect. It's directly encrypted with Ruth's key, not Apple's, so Apple can't view it.

6:40: "Ruth sends in her list of pseudonyms:" this is incorrect, Ruth sends in the most recent public keys Timmy has broadcasted.

6:45: "Apple verifies if they're correct" this is not true: Apple can't read it and doesn't do any authentication whatsoever. It relies on the fact if a person other than the device owner pulled it, they wouldn't have the key necessary to decrypt it, so they'd get a bunch of nonsensical garbled data because it's encrypted.

7:00: "We are putting a whole lot of trust into Apple:" not true, Apple does nothing other than host garbled information. They can't read it. The only trust you put into Apple is that they don't indiscriminately delete everyone's info to prevent people from finding it or possibly gathering lists of public keys and then sending incorrect information. I guess it's theoretically possible for them to figure out where Lassie goes, but there are wayyyy easier ways to do that (through Apple Location Services or the cell towers). They could leak the database of missing devices, but that wouldn't cause much damage because it's encrypted using the OWNER's key, NOT Apple's.

28 cao thanh nhật 29/09/2021 - 10:28 Chiều

That find my iphone is sus

jholotan best 29/09/2021 - 10:28 Chiều

This is actually a super great technology because it hardly makes you any more tractable if you are already carrying an iPhone with you and it really helps you find lost items.

Duckies 52 29/09/2021 - 10:28 Chiều

This is not creepy, this is absolute big brain

László Gondi 29/09/2021 - 10:28 Chiều

I find your lack of faith disturbing

Luka Pogorelz 29/09/2021 - 10:28 Chiều

Every point you brought up has already been addressed by Apple?

They're using unique one-time identifiers and they're encrypting all traffic.

I agree on the fact that security through obscurity is not the best of approaches.

PHEONIX HD 29/09/2021 - 10:28 Chiều

I trust apple but I don't trust Facebook

Toast 29/09/2021 - 10:28 Chiều

I don't really find this creepy, also if you really want there is a setting to not participate in the network.

Luud 29/09/2021 - 10:28 Chiều

Can you reverse enigeneer this and find stolen iphones yourself

Paul Richard 29/09/2021 - 10:28 Chiều

I experienced this when I sent my iPhone via the mail for repair, it was pretty cool to follow it through its journey on findmy. I think it only had Bluetooth and wifi turned on, and no SIM card and I would get fairly frequents updates.

Dylan Bezuidenhout 29/09/2021 - 10:28 Chiều

i love it,My mom's iphone was stolen on my B-Day and sometimes is comes online as they are still trying to get into the phone so find my(lost mode)is very helpful

x86 Instruction Set Architecture 29/09/2021 - 10:28 Chiều

Apple or Iphone and all Apple Hardware is Proprietary, It is Founded by Trade Secrets and intellectual property

By the Laws, i set for myself Proprietary Hardware and Software Must be Dead.
Go for Libram 5, It's Open Source Hardware and they share Their Schematics and Bored Design Files.

You just need the machinery to build it, and you don't need to trust anyone.

Edouard 29/09/2021 - 10:28 Chiều

I don’t why security minded people would find it a concern that their phones are reporting stolen or lost devices. Unless they are fine with stealing.

Dylan P 29/09/2021 - 10:28 Chiều

“Like Bluetooth and airtags” well I mean, I guess that we’ve been waiting 2 years for nothing Because apparently they’re already built into our devices

Bálint Fodor 29/09/2021 - 10:28 Chiều

Find my iPhone originally doesn't work by locating via cell towers. It connects to your iPhone via either mobile data or wifi and sends the phone's gps location to iCloud. At 1:35 you also say AirTags instead of AirDrop. AirTags aren't released yet and AirDrop has nothing to do with locating devices. The only connection is that it's using wifi and bluetooth to transfer data between devices.

theLuigiFan0007 29/09/2021 - 10:28 Chiều

This system seems fairly competently designed, going off what you mentioned. Lots of key verification, in the correct order is good. First of all, having a list of randomized keys for the reporting device is definitely a good idea. Anything that works like a remote should have rolling codes. The fact the participating relay device uses a randomized identity is also good, as this limits the extent of usability if the data is leaked, without a massive correlation being run on the data set. Encrypting with standard pubkey encryption before sending it to Apple is expected, this isn't 2004 and HTTP/1.1. The fact that the searching device requesting the coordinates has it's identity verified before they are sent to it is also a good measure. Yes, Apple needs to make sure their servers are continuously searched for exploits, but it means there's a 2FA-like system in place, which greatly improves security. Overall, based on this video, I would trust this system, on a 'necessary evil' basis, because recovering a lost device is worth the slight reduction in privacy it causes. Plus, I find grid networks to be a cool concept in general.

Sea Celery 29/09/2021 - 10:28 Chiều

tbh I kinda hope google implements something similar if they haven't yet cuz I personally love the idea of crowd based device tracking

LeoLegit 29/09/2021 - 10:28 Chiều

i would.

if i liked apples overpriced products

i say while all of my gaming gear is razer and other overpriced stuff

Josh Palmer 29/09/2021 - 10:28 Chiều

im sorry to break the news to you but if you have a smart phone, you're being tracked no matter what.

Steve Harisson 29/09/2021 - 10:28 Chiều

All this technological advancement, i still couldn't find Waldo

Marco Flores 29/09/2021 - 10:28 Chiều

Now is a sport to críticize google and apple without any real proof of what they are talking about, just a few people really explains how things happen in real time and what data is leaked to big tech companies, regularly YouTubers like this channel just talk and talk about privacy and stuff like that but they don’t have real information, they can’t see the difference between secure and private. If you want privacy you need to live like master roshi

Dillon 29/09/2021 - 10:28 Chiều

Simply put example in fine with MD collecting data on what food i buy to not over buy or under buy minimize waste keeping prices low

What’s happening with some companies are figuratively saying put a gps on the car when you leave md and see what they buy at dicks and h&M ect

Frosty 29/09/2021 - 10:28 Chiều

He talks like the president in the game detroit become human.

Peter Trevena 29/09/2021 - 10:28 Chiều

IOS is more secure than is one thing going for it.

PotatoNetwork 29/09/2021 - 10:28 Chiều

I love this feature…..

LightBox 29/09/2021 - 10:28 Chiều

How did you go about making this entire video not knowing that you can turn this feature off independently of find my iPhone. The whole find my network thing was added not that long ago

Ole Janssen 29/09/2021 - 10:28 Chiều

Apple: We care about privacy.
Also Apple: Let's keep a gigantic database of user locations.

Tobias Steen 29/09/2021 - 10:28 Chiều

You are able to turn of this feature and use Find My as normal.


Leave a Comment