Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,540
39,386


Ahead of the debut of AirTags and support for locating third-party Bluetooth items through Find My in iOS 14.5, a team of security researchers from the Secure Mobile Networking Lab at the Technical University of Darmstadt in Germany has reverse engineered the Find My protocol and developed an app that's designed to let anyone create an "AirTag" based on a Bluetooth-capable device.

openhaystack-mac-app.jpg

Called OpenHaystack, the app and the source code are available on GitHub for those who are interested in taking a look. The app allows users to create their own Bluetooth tags based on the Find My network by installing an "AirTag" firmware image on a Bluetooth dongle.

The app displays the most recent location of a created Bluetooth tag reported by any iPhone using Apple's Find My network that was implemented in iOS 13, plus it shows the location of the tag on a map.

According to the security researchers, the created tags send out Bluetooth beacons, which are picked up by nearby iPhones that interpret the sending device as lost. The current geolocation is end-to-end encrypted and then uploaded to Apple, with the OpenHaystack app then downloading the encrypted report from Apple and decrypting it locally on the Mac.

In the process of developing this tool, the Secure Mobile Networking Lab researchers also identified a macOS Catalina Find My vulnerability that was reported to Apple and addressed in a 10.15.7 update released back in November. The vulnerability allowed a malicious app to access iCloud decryption keys to download and decrypt location reports submitted by the Find My network.

Apple's iOS 14.5 update includes support for tracking third-party Bluetooth devices in the Find My app using a new "Items" tab, which takes advantage of the same Find My protocol used for the Mac app.

At the current time, in-app tracking is limited to Beats headphones and upcoming Belkin wireless earbuds, but in the future, many third-party Bluetooth devices may include Find My integration, making it easier to keep track of them. This system will also be used by Apple's own rumored AirTags, which have yet to be released.

Article Link: Security Researchers Develop Framework for Tracking Bluetooth Devices Using Find My
 
  • Like
Reactions: peanuts_of_pathos
Does anyone know what the deal is with the special-snowflake iCloud tokens?

Is this security hole intentional for Mail.app, and/or why is Mail.app the entry point?
Screenshot 2021-03-04 at 20.28.34.png
 
The article is about a couple of researchers creating an app that makes use of a security vulnerability with Find My. There is no indication that Apple is "on top of it," in regards to this third party Github app." This isn't awesome stuff. This is concerning.
No, that is not what it says.
It says that they have managed to reverse engineer the protocol enough to make their own trackable devices.
It also mentions a vulnerability, that has been fixed, and has nothing to do with the above.
 
The article is about a couple of researchers creating an app that makes use of a security vulnerability with Find My. There is no indication that Apple is "on top of it," in regards to this third party Github app." This isn't awesome stuff. This is concerning.
You’re reading it wrong. The vulnerability was related to macOS, not the reverse engineering of the Find My network.

Edit: Looking at the paper, they indeed did find two vulnerabilities, one of which has been addressed. Both vulnerabilities have been reported to Apple.
 
You’re reading it wrong. The vulnerability was related to macOS, not the reverse engineering of the Find My network.

Edit: Looking at the paper, they indeed did find two vulnerabilities, one of which has been addressed. Both vulnerabilities have been reported to Apple.
Thanks to you and @realjerk for the correction. I will amend my post.
 
  • Like
Reactions: peanuts_of_pathos
I hope Apple does patch the vulnerability and render this app useless.
Why not? Security holes are bad. Anyone who wants to integrate into the Find My network can do so the official way.

Why is it a vulnerability or bug? All it means is people have a way to integrate unofficial hardware into their Find My system, the same way Homebridge lets you integrate unofficial HomeKit devices into your HomeKit network. You guys are so weird for thinking it's a problem when people find ways to better utilize services like this.
 
Does anyone know what the deal is with the special-snowflake iCloud tokens?

Is this security hole intentional for Mail.app, and/or why is Mail.app the entry point?
View attachment 1738683
If I had to hazard a complete guess, I'd reckon it'd be because icloud mail is one of the few icloud services that has to be able to run on non-apple hardware/software? So maybe it's the easiest to obtain a token from? I'm kind of going the Cunningham's Law approach with this one lol
 
  • Like
Reactions: peanuts_of_pathos
So basically I buy one of these Air Tags. Pair with my iPhone. Swing it in someone else garment or purse ... start tracking anyone?

How does this really work?
Read down the front page of MR and you'll see. Apple already has a function in iOS 14.5 that will detect unknown tags/devices and alert you and disable them, if you give permission.
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.