Security researcher successfully jailbreaks an Apple AirTag
11 May
2021
11 May
'21
12:44 p.m.
'This weekend, German security researcher stacksmashing declared success at breaking into, dumping, and reflashing the microcontroller of Apple's new AirTag object-location product.
Breaking into the microcontroller essentially meant being able both to research how the devices function (by analyzing the dumped firmware) and to reprogram them to do unexpected things. Stacksmashing demonstrated this by reprogramming an AirTag to pass a non-Apple URL while in Lost Mode.'
-- source: https://arstechnica.com/information-technology/2021/05/security-researcher-s...
Cheers, Peter
--
Peter Reutemann
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 577-5304
http://www.cms.waikato.ac.nz/~fracpete/
http://www.data-mining.co.nz/
1158
Age (days ago)
1158
Last active (days ago)
0 comments
1 participants
participants (1)
-
Peter Reutemann