The Various Encryption Implementations in the Palm of Your Hand: Dissecting the Protocols Inside Apple AirTags

Presented at Objective by the Sea version 6.0 (2023), Oct. 12, 2023, 4:10 p.m. (25 minutes).

Two and a half years ago, Apple introduced "AirTags",compact devices roughly the size of a quarter, that are designed to enable geolocation of personal items such as luggage, wallets, purses, and even pets.While AirTags offer valuable functionality, they have also raised significant privacy concerns regarding potential stalking risks and the potential misuse of Apple 's FindMy framework by malicious individuals.\n\n This presentation will delve into the encryption mechanisms employed by AirTags to facilitate their integration with the FindMy protocol and breakdown the transmission of FindMy data over Apple's proprietary Bluetooth Low Energy(BLE) protocol, known as Continuity.The overall security of Apple’ s chosen protocols will be discussed, including methodologies for exploiting the protocol as well as the practical applications and reasoning behind Apple’ s choices.\n\n Finally, the future longevity of this protocol will be addressed in light of new Internet Engineering Task Force(IETF) protocol standards.

Presenters:

  • Christine Fossaceca - Senior Mobile Security Researcher and Reverse Engineer at Microsoft
    Christine Fossaceca is a senior mobile security researcher and reverse engineer. She specializes in iOS, and has a background in mobile exploit development, forensics techniques, red teaming, and penetration testing. \n\n Christine currently works for Microsoft where she analyzes iOS 0-days and collaborates with the Defender for Endpoint team on protecting customers, and tries not to let her dog distract her too much.

Links:

Similar Presentations: