I'm also interested by the Haystack project to have an ESP32-based object identify as an AirTag and be able to follow it
Does anyone knows if their approach is "sustainable", or if Apple can easily "block out" such hacks from their network?
replies(1):