infosec
Discussions about information security, applied cryptography, and privacy-preserving technology
᠎ pfp
0 reply
1 recast
2 reactions

Mantej Rajpal pfp
1 reply
0 recast
3 reactions

Mantej Rajpal pfp
0 reply
0 recast
1 reaction

Ed O'Shaughnessy pfp
0 reply
0 recast
1 reaction

᠎ pfp
0 reply
0 recast
1 reaction

Mantej Rajpal pfp
2 replies
0 recast
2 reactions

Mantej Rajpal pfp
0 reply
0 recast
1 reaction

Ed O'Shaughnessy pfp
0 reply
0 recast
1 reaction

Andrew pfp
0 reply
0 recast
4 reactions

Andrew pfp
1 reply
0 recast
1 reaction

Mantej Rajpal pfp
1 reply
0 recast
3 reactions

᠎ pfp
0 reply
0 recast
4 reactions

Ed O'Shaughnessy pfp
0 reply
1 recast
1 reaction

Mantej Rajpal pfp
1 reply
1 recast
7 reactions

Daniel Lombraña pfp
Apple's Find My Network Exploit Lets Hackers Silently Track Any Bluetooth Device 9to5Mac reports: Although AirTag was designed to change its Bluetooth address based on a cryptographic key, the attackers developed a system that could quickly find keys for Bluetooth addresses. This was made possible by using "hundreds" of GPUs to find a key match. The exploit called "nRootTag" has a frightening success rate of 90% and doesn't require "sophisticated administrator privilege escalation." In one of the experiments, the researchers were able to track the location of a computer with an accuracy of 10 feet, which allowed them to trace a bicycle moving through the city. In another experiment, they reconstructed a person's flight path by tracking their game console. https://yro.slashdot.org/story/25/02/28/013227/apples-find-my-network-exploit-lets-hackers-silently-track-any-bluetooth-device?utm_source=rss1.0mainlinkanon&utm_medium=feed
1 reply
0 recast
1 reaction