Security researcher successfully jailbreaks an Apple AirTag

11 May
2021
11 May
'21
12:44 p.m.
'This weekend, German security researcher stacksmashing declared success at breaking into, dumping, and reflashing the microcontroller of Apple's new AirTag object-location product. Breaking into the microcontroller essentially meant being able both to research how the devices function (by analyzing the dumped firmware) and to reprogram them to do unexpected things. Stacksmashing demonstrated this by reprogramming an AirTag to pass a non-Apple URL while in Lost Mode.' -- source: https://arstechnica.com/information-technology/2021/05/security-researcher-s... Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 577-5304 http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/
1448
Age (days ago)
1448
Last active (days ago)
0 comments
1 participants
participants (1)
-
Peter Reutemann