←back to thread

378 points nkko | 3 comments | | HN request time: 0.421s | source
Show context
oulipo ◴[] No.42479919[source]
I'm also interested by the Haystack project to have an ESP32-based object identify as an AirTag and be able to follow it

Does anyone knows if their approach is "sustainable", or if Apple can easily "block out" such hacks from their network?

replies(1): >>42480108 #
Its_Padar ◴[] No.42480108[source]
If it functions exactly as an AirTag does then it would be hard as they would not want to block all previously sold AirTags
replies(1): >>42480135 #
crazygringo ◴[] No.42480135[source]
Is there something it can do to whitelist legitimate AirTag serial numbers?
replies(2): >>42480197 #>>42480431 #
bhy ◴[] No.42480197[source]
I don't think AirTag work that way. AirTag protocol is specifically designed so Apple or other parties will not be able to track users by serial numbers.
replies(1): >>42480349 #
1. gjsman-1000 ◴[] No.42480349[source]
Where there's a will, there's a way. Apple is very clear law enforcement can approach them with any AirTag and they will immediately be able to tie it to a user.
replies(2): >>42481024 #>>42484270 #
2. kolinko ◴[] No.42481024[source]
One doesn’t exclude the other - a physical airtag may have an ID available, but not broadcast it anywhere.

Also, “when there’s a will…” doesn’t really apply to cruptography

3. bolognafairy ◴[] No.42484270[source]
That is not the same thing.