Lois... Ma... Mommy...: Stewie Talking to Apple's Satellite Network

Presented at Objective by the Sea version 6.0 (2023), Oct. 12, 2023, 11:50 a.m. (40 minutes).

Apple's cutting-edge emergency SOS and location sharing services have empowered users with crucial communication alternatives, particularly when traditional network coverage is not available. This talk will shed light on the functioning of these satellite services, present the security measures employed to safeguard resource access and privacy, and explore how this communication is embedded within the operating system. \n\n With the release of the iPhone 14, users can reach out to emergency services, by sending an SOS message via a satellite link directly from their phone. This innovative use of the GlobalStar network facilitates two-way communication with emergency responders through the Messages app. Users can swiftly send text messages and respond to queries. This communication channel, due to its sensitive nature, demands robust security and authentication. It is imperative for Apple to ensure that the system is foolproof, negating the possibility of dispatching emergency responders to incorrect locations or individuals. Equally significant is the protection of the privacy of those in need, including their location and the nature of their emergency. \n\n Moreover, Apple's satellite features allow users to share their location in Find My with up to ten friends via a satellite link. This capability serves as a convenient tool for staying connected with friends and family while venturing off the beaten path. Whether you're hiking, globe-trotting, or exploring remote locations where data roaming is unavailable, this feature ensures you're never entirely off the grid. We’ll take a look into how this new Find My extension is implemented.

Presenters:

  • Jiska Classen - Wireless and Mobile Security Researcher at Hasso Plattner Institute
    Jiska is a wireless and mobile security researcher at Hasso Plattner Institute. Her main expertise is low-level wireless subsystems, such as firmware and daemons. She likes reverse engineering them and opening up interfaces for other researchers and users as well. Thus, she is known for Bluetooth analysis tooling such as InternalBlue and Frankenstein.
  • Alexander Heinrich - PhD-candidate and Security Researcher
    Alexander is a PhD-candidate and security researcher. His research focuses on proprietary Apple protocols, such as Find My, UWB, and Satellite communications. By analyzing these, he not only uncovers new security and privacy issues but also creates free open-source tools to interact with them like OpenHaystack and AirGuard. AirGuard helps people to detect unwanted tracking and find hidden tracking devices.

Links:

Similar Presentations: