v1v2 (latest)
A Relay a Day Keeps the AirTag Away: Practical Relay Attacks on Apple's AirTags
Gabriel K. Gegenhuber
Leonid Liadveikin
Florian Holzbauer
Sebastian Strobl
- LLMSV
Main:1 Pages
3 Figures
Bibliography:1 Pages
Appendix:1 Pages
Abstract
Apple AirTags use Apple's Find My network: when nearby iDevices detect a lost tag, they anonymously forward an encrypted location report to Apple, which the tag's owner can then fetch to locate the item. That encryption protects privacy -- neither the finder nor Apple learns the owner's identity -- but it also prevents Apple from validating the correctness of received reports.We show that this design weakness can be exploited: using a relay attack, we can inject manipulated location reports so the Find My service reports a false position for a lost AirTag. The same technique can be used to deny recovery of a targeted tag (a focused DoS), since the owner is misled about its whereabouts.
View on arXivComments on this paper
