Replies: 1 comment
-
Your idea is very good. However, AirGuard cannot scan for Apple Find My devices in the background, since Apple restricts this. Therefore, a functionality like this could only be implemented in the Android version. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
In theory, you can create airtag-style tracker with generating new public keys (for example, newest nRF54L15 MCU can calculate ECDH SECP224R1 public key in milliseconds almost without any additional load on battery). As Apple FindMy network doesn't require any trackers registration, you can develop an algorithm to generate pseudo-random private keys, say every 5 minutes (or even every minute), then calculate public key right inside the tracker and broadcast it, never using same public key twice. Then request tracking data from Apple network with a script that uses same algorithm to create private keys and time-synced with the tracker. Most of anti-tracking software will ignore that tracker as it will look like there is just new tracker every rotation cycle.
Probably will be good idea to think how to protect against those as they will be quite easy and cheap to implement. I think, anti-tracking software should not just look for same keys for long periods of time but warn user if there is any trackers quite close (with high RSS) for like a hour, even if public keys for these trackers are not same. May be even store timestamps for every tracker key and check if a tracker appears for some time, then disappears and next tracker does same with exactly same period of time.
Beta Was this translation helpful? Give feedback.
All reactions