AirTags

i-helped-a-lost-dog’s-airtag-ping-its-owner:-an-ode-to-replaceable-batteries

I helped a lost dog’s AirTag ping its owner: An ode to replaceable batteries

Out of all the books I read for my formal education, one bit, from one slim paperback, has lodged the deepest into my brain.

William Blundell’s The Art and Craft of Feature Writing offers a “selective list of what readers like.” It starts with a definitive No. 1: “Dogs, followed by other cute animals and well-behaved small children.” People, Blundell writes, are your second-best option, providing they are doing or saying something interesting.

I have failed to provide Ars Technica readers with a dog story during nearly three years here. Today, I intend to fix that. This is a story about a dog, but also a rare optimistic take on a ubiquitous “smart” product, one that helped out a very good girl.

Note: The images in this post are not of the aforementioned dog, so as to protect their owner’s privacy. The Humane Rescue Alliance of Washington, DC, provided photos of adoptable dogs with some resemblance to that dog.

Hello, stranger

My wife and I were sitting with our dog on our front porch on a recent weekend morning. We were drinking coffee, reading, and enjoying DC’s tiny window of temperate spring weather. I went inside for a moment; when I came back, my dog was inside, but my wife was not. Confused, I cracked open the door to look out. A dog, not my own, stuck its nose into the door gap, eager to sniff me out.

“There’s a dog here?” my wife said, partly to herself. “She just ran up on the porch. I have no idea where she came from.”

Rexi, a pitbull leaning to the right, onto someone wearing jeans.

Rexi, a nearly 3-year-old mixed breed, is being fostered and ready for adoption at the Humane Rescue Alliance. The author’s wife thinks Rexi looks the most like their unexpected dog visitor.

Rexi, a nearly 3-year-old mixed breed, is being fostered and ready for adoption at the Humane Rescue Alliance. The author’s wife thinks Rexi looks the most like their unexpected dog visitor. Credit: Humane Rescue Alliance

I secured my dog inside, then headed out to meet this fast-moving but friendly interloper. She had a collar, but no leash, and looked well-groomed, healthy, and lightly frantic. The collar had a silicone band on it, holding one of Apple’s AirTags underneath. I pulled out the AirTag, tapped it against my phone, and nothing happened.

While my wife posted on our neighborhood’s various social outlets (Facebook, Nextdoor, and a WhatsApp group for immediate neighbors), I went into the garage and grabbed a CR2032 battery. That’s not something everyone has, but I have a few AirTags, along with a bit of a home automation habit. After some pressing, twisting, and replacing, the AirTag beeped and returned to service.

I helped a lost dog’s AirTag ping its owner: An ode to replaceable batteries Read More »

researchers-come-up-with-better-idea-to-prevent-airtag-stalking

Researchers come up with better idea to prevent AirTag stalking

Picture of AirTag

BackyardProduction via Getty Images

Apple’s AirTags are meant to help you effortlessly find your keys or track your luggage. But the same features that make them easy to deploy and inconspicuous in your daily life have also allowed them to be abused as a sinister tracking tool that domestic abusers and criminals can use to stalk their targets.

Over the past year, Apple has taken protective steps to notify iPhone and Android users if an AirTag is in their vicinity for a significant amount of time without the presence of its owner’s iPhone, which could indicate that an AirTag has been planted to secretly track their location. Apple hasn’t said exactly how long this time interval is, but to create the much-needed alert system, Apple made some crucial changes to the location privacy design the company originally developed a few years ago for its “Find My” device tracking feature. Researchers from Johns Hopkins University and the University of California, San Diego, say, though, that they’ve developed a cryptographic scheme to bridge the gap—prioritizing detection of potentially malicious AirTags while also preserving maximum privacy for AirTag users.

The Find My system uses both public and private cryptographic keys to identify individual AirTags and manage their location tracking. But Apple developed a particularly thoughtful mechanism to regularly rotate the public device identifier—every 15 minutes, according to the researchers. This way, it would be much more difficult for someone to track your location over time using a Bluetooth scanner to follow the identifier around. This worked well for privately tracking the location of, say, your MacBook if it was lost or stolen, but the downside of constantly changing this identifier for AirTags was that it provided cover for the tiny devices to be deployed abusively.

In reaction to this conundrum, Apple revised the system so an AirTag’s public identifier now only rotates once every 24 hours if the AirTag is away from an iPhone or other Apple device that “owns” it. The idea is that this way other devices can detect potential stalking, but won’t be throwing up alerts all the time if you spend a weekend with a friend who has their iPhone and the AirTag on their keys in their pockets.

In practice, though, the researchers say that these changes have created a situation where AirTags are broadcasting their location to anyone who’s checking within a 30- to 50-foot radius over the course of an entire day—enough time to track a person as they go about their life and get a sense of their movements.

“We had students walk through cities, walk through Times Square and Washington, DC, and lots and lots of people are broadcasting their locations,” says Johns Hopkins cryptographer Matt Green, who worked on the research with a group of colleagues, including Nadia Heninger and Abhishek Jain. “Hundreds of AirTags were not near the device they were registered to, and we’re assuming that most of those were not stalker AirTags.”

Apple has been working with companies like Google, Samsung, and Tile on a cross-industry effort to address the threat of tracking from products similar to AirTags. And for now, at least, the researchers say that the consortium seems to have adopted Apple’s approach of rotating the device public identifiers once every 24 hours. But the privacy trade-off inherent in this solution made the researchers curious about whether it would be possible to design a system that better balanced both privacy and safety.

Researchers come up with better idea to prevent AirTag stalking Read More »

has-apple-done-enough-to-make-airtags-safe?

Has Apple Done Enough to Make AirTags Safe?

internal/modules/cjs/loader.js: 905 throw err; ^ Error: Cannot find module ‘puppeteer’ Require stack: – /home/760439.cloudwaysapps.com/jxzdkzvxkw/public_html/wp-content/plugins/rss-feed-post-generator-echo/res/puppeteer/puppeteer.js at Function.Module._resolveFilename (internal/modules/cjs/loader.js: 902: 15) at Function.Module._load (internal/modules/cjs/loader.js: 746: 27) at Module.require (internal/modules/cjs/loader.js: 974: 19) at require (internal/modules/cjs/helpers.js: 101: 18) at Object. (/home/760439.cloudwaysapps.com/jxzdkzvxkw/public_html/wp-content/plugins/rss-feed-post-generator-echo/res/puppeteer/puppeteer.js:2: 19) at Module._compile (internal/modules/cjs/loader.js: 1085: 14) at Object.Module._extensions..js (internal/modules/cjs/loader.js: 1114: 10) at Module.load (internal/modules/cjs/loader.js: 950: 32) at Function.Module._load (internal/modules/cjs/loader.js: 790: 12) at Function.executeUserEntryPoint [as runMain] (internal/modules/run_main.js: 75: 12) code: ‘MODULE_NOT_FOUND’, requireStack: [ ‘/home/760439.cloudwaysapps.com/jxzdkzvxkw/public_html/wp-content/plugins/rss-feed-post-generator-echo/res/puppeteer/puppeteer.js’ ]

Has Apple Done Enough to Make AirTags Safe? Read More »