Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Apple has a culture problem. This is inexcusable. The attack isn't sophisticated, or even clever-- accept and run executable code from a form entry over the internet?

The intern who wrote this needs to be fired, along with the manager who hired that intern, and the whole intern screening process needs to be reviewed.

And please don't ask "How do you know it was an intern?" If this wasn't written by some executive's entitled nephew, then it would mean it was written by someone who paid actual tuition dollars and was taught nothing-- and that just confuses my whole notion of who the true victim is here.
 
Last edited:
But doesn't an AirTag have to be linked to a legitimate iCloud account for it to be activated and then put into Lost Mode in the first place? So why would someone start a phishing attack using a device linked to their personal iCloud account? Seems like a storm in a teacup.
What about a hacked iCloud account, or a burner?
 
  • Like
Reactions: freedomlinux
I swallowed an AirTag late Sunday night as a dare but it has still not come out and it is nearly Wednesday. Should I be worried? When I did the same with an AirPod it came out the next day and in the meantime I was able to connect to it via Bluetooth and play the lost AirPod chime. The AirTag I can't connect to at all, leading me to believe that it may be malfunctioning and perhaps that is why it hasn't come out.
 
I swallowed an AirTag late Sunday night as a dare but it has still not come out and it is nearly Wednesday. Should I be worried? When I did the same with an AirPod it came out the next day and in the meantime I was able to connect to it via Bluetooth and play the lost AirPod chime. The AirTag I can't connect to at all, leading me to believe that it may be malfunctioning and perhaps that is why it hasn't come out.
If the AirTag isn't findable, probably the unit has already leaked. I.e. the water-resistant seal is broken and is being digested by your acids.
 
If the AirTag isn't findable, probably the unit has already leaked. I.e. the water-resistant seal is broken and is being digested by your acids.
I'm no fool, it was enclosed in a waterproof baggie! No liquid should have gotten to it.
 
Although I certainly don't condone Apple hesitating in addressing security issues I'm also starting to view "security researchers" as petty people who put themselves over the security of us all. "Apple didn't commit to recognizing that I found out I can inject some HTML into the AirTags message so now I'm going to go tell the world how to break this," isn't a mature response.
It’s more like blackmail.
 
Fine — I just don’t like the fact that he’s basically saying pay me or I’m going public with the security issue I found. That’s sleazy.
He did this after Apple didn’t react for 90days. Which is common practice and Apple knows this

on the other hand he’s doing Apples job why shouldn’t they pay for good work with billions sitting in overseas bank accounts?
 
We can spin this to match whatever our particular bias may be, so here's mine:

"Security Researcher" was a term coined to help white hat hackers escape the stigma of being associated with black hat hackers. At this point, it's just as hard to trust the motivation of a "security researcher" as it is a "hacker."

It seems that some elements of the "security research" community are putting ego and reward in front of security. If they don't like how Apple is handling its bounty program they threaten to take their discoveries to the highest bidder, or expose them for all to see (and use). That's not exactly White Hat behavior.

Since White Hat/Black Hat are terms lifted from the movies... what White Hat (like the Lone Ranger, Wyatt Earp, Hopalong Cassidy, Roy Rogers, etc.) would, if they detected a security weakness down at the Sagebrush Bank and Trust, threaten the bank manager, "Well, I'll just tell the Dalton Gang about this if you don't fix it right pronto! Oh, and don' fergit to tell the Tombstone Gazette that I'm the one who told ya ta fix it, and I 'spect ta see that fine Appaloosa o' yers grazin' in my corral by next sunup."

Sure, it's been accepted practice for some time to give a developer like Apple, Microsoft, Google, etc. a set period of time in which to privately fix an issue before taking it public. It certainly seems like a plausible way to encourage a timely response from a big, slow-moving bureaucracy. Call it a 60-day threat. The trouble is, there is room for abuse as well.

Then there's the definition of "zero-day" threat. Any threat unknown to the developer, or if known, has yet to be fixed, gets that scary term. "Zero-day" does not define the severity of the threat, but there have been plenty of media reports that give the impression that "zero-day" means Doomsday is at hand. What's the difference between "zero-day threat" and "previously undetected threat?" Nada. But you can be sure the only term some Security Researchers will use to describe their discoveries is the more inflammatory, "zero-day."

I'm not discounting the risk posed by the threat described here, but due to one key pre-condition - that the web form can only be accessed by finding/stealing an AirTag, it's a whole lot harder to exploit than, for example, sending a malicious link via SMS or email. OMG, entire communications systems are threats! (How much is that insight worth to Apple?) And by its nature (a data form field lacking data validation rules), this particular threat is pretty darned easy to fix (so yeah, fix it pronto, Apple). Meantime, what can, say, MacRumors do to ensure that only safe URLs are inserted in posts like this?
 
He did this after Apple didn’t react for 90days. Which is common practice and Apple knows this

on the other hand he’s doing Apples job why shouldn’t they pay for good work with billions sitting in overseas bank accounts?
That’s called blackmail.

We’re also just hearing one side of the story, so don’t be so quick to take his story as the truth — there could be more to this than we know — maybe he demanded more than what was offered? I don’t know, because we’re just hearing one side and it doesn’t make sense.
 
Negative post after negative post this week.

Apple cannot catch a break. Come on Apple you are better than this!

I'm definitely not going near any lost Air Tags now
 
  • Like
Reactions: VulchR
That’s called blackmail.

We’re also just hearing one side of the story, so don’t be so quick to take his story as the truth — there could be more to this than we know — maybe he demanded more than what was offered? I don’t know, because we’re just hearing one side and it doesn’t make sense.
Everything can be cleared once Apple responds. I mean as a company that uses privacy and security as the main selling point, it’s in the best interest of Apple to clarify reports like this. But it they stayed silent, then one has to ask why. Is Apple that arrogant? Could be.
 
  • Like
Reactions: psxp
I swallowed an AirTag late Sunday night as a dare but it has still not come out and it is nearly Wednesday. Should I be worried? When I did the same with an AirPod it came out the next day and in the meantime I was able to connect to it via Bluetooth and play the lost AirPod chime. The AirTag I can't connect to at all, leading me to believe that it may be malfunctioning and perhaps that is why it hasn't come out.
I think it’s completely irresponsible that Apple hasn’t provided their users with detailed information regarding this. WHAT ARE THEY HIDING??
 
  • Like
Reactions: macar00n
We can spin this to match whatever our particular bias may be, so here's mine:

"Security Researcher" was a term coined to help white hat hackers escape the stigma of being associated with black hat hackers. At this point, it's just as hard to trust the motivation of a "security researcher" as it is a "hacker."

It seems that some elements of the "security research" community are putting ego and reward in front of security. If they don't like how Apple is handling its bounty program they threaten to take their discoveries to the highest bidder, or expose them for all to see (and use). That's not exactly White Hat behavior.

Since White Hat/Black Hat are terms lifted from the movies... what White Hat (like the Lone Ranger, Wyatt Earp, Hopalong Cassidy, Roy Rogers, etc.) would, if they detected a security weakness down at the Sagebrush Bank and Trust, threaten the bank manager, "Well, I'll just tell the Dalton Gang about this if you don't fix it right pronto! Oh, and don' fergit to tell the Tombstone Gazette that I'm the one who told ya ta fix it, and I 'spect ta see that fine Appaloosa o' yers grazin' in my corral by next sunup."

Sure, it's been accepted practice for some time to give a developer like Apple, Microsoft, Google, etc. a set period of time in which to privately fix an issue before taking it public. It certainly seems like a plausible way to encourage a timely response from a big, slow-moving bureaucracy. Call it a 60-day threat. The trouble is, there is room for abuse as well.

Then there's the definition of "zero-day" threat. Any threat unknown to the developer, or if known, has yet to be fixed, gets that scary term. "Zero-day" does not define the severity of the threat, but there have been plenty of media reports that give the impression that "zero-day" means Doomsday is at hand. What's the difference between "zero-day threat" and "previously undetected threat?" Nada. But you can be sure the only term some Security Researchers will use to describe their discoveries is the more inflammatory, "zero-day."

I'm not discounting the risk posed by the threat described here, but due to one key pre-condition - that the web form can only be accessed by finding/stealing an AirTag, it's a whole lot harder to exploit than, for example, sending a malicious link via SMS or email. OMG, entire communications systems are threats! (How much is that insight worth to Apple?) And by its nature (a data form field lacking data validation rules), this particular threat is pretty darned easy to fix (so yeah, fix it pronto, Apple). Meantime, what can, say, MacRumors do to ensure that only safe URLs are inserted in posts like this?
Excellent analysis.
 
That’s not what Find My AirTag indicates when I activate the AT Lost Mode.
Then it indicated wrong, and common sense also said it's wrong.

It's called Activation Lock. iPhone has it as well. Nobody can grab your iPhone while screen is turned on and reset it and use it without knowing your iCloud password.
With the addition of the Activation Lock, the phone's owner must enter their Apple account password before the phone can be wiped. This binds the device to a specific person and makes it a less attractive target because it cannot be easily wiped and resold.
Actually AirTag is harder since you also have to find THE iPhone it's setup with, to reset it.
 
Last edited:
Apple is a bunch of people working from home with distractions & babies crying in the background. COVD has seriously impacted getting things done at all. They are running on fumes and it’s surprising that they get some stuff done. What’s not surprising is all the messed up little details that need fixing, but communication is broken and people in authority are unavailable. Decisions that need making are lost in the ongoing chaos of COVID workforces.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.