←back to thread

378 points nkko | 8 comments | | HN request time: 0s | source | bottom
1. oulipo ◴[] No.42479919[source]
I'm also interested by the Haystack project to have an ESP32-based object identify as an AirTag and be able to follow it

Does anyone knows if their approach is "sustainable", or if Apple can easily "block out" such hacks from their network?

replies(1): >>42480108 #
2. Its_Padar ◴[] No.42480108[source]
If it functions exactly as an AirTag does then it would be hard as they would not want to block all previously sold AirTags
replies(1): >>42480135 #
3. crazygringo ◴[] No.42480135[source]
Is there something it can do to whitelist legitimate AirTag serial numbers?
replies(2): >>42480197 #>>42480431 #
4. bhy ◴[] No.42480197{3}[source]
I don't think AirTag work that way. AirTag protocol is specifically designed so Apple or other parties will not be able to track users by serial numbers.
replies(1): >>42480349 #
5. gjsman-1000 ◴[] No.42480349{4}[source]
Where there's a will, there's a way. Apple is very clear law enforcement can approach them with any AirTag and they will immediately be able to tie it to a user.
replies(2): >>42481024 #>>42484270 #
6. stonegray ◴[] No.42480431{3}[source]
They do, Airtag hardware need to be signed to add to your iCloud account. But the actual location beacon messages are not linked to your iCloud account and can’t be associated with the sending airtag.
7. kolinko ◴[] No.42481024{5}[source]
One doesn’t exclude the other - a physical airtag may have an ID available, but not broadcast it anywhere.

Also, “when there’s a will…” doesn’t really apply to cruptography

8. bolognafairy ◴[] No.42484270{5}[source]
That is not the same thing.