The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

  • Southern Wolf@pawb.social
    link
    fedilink
    arrow-up
    20
    arrow-down
    4
    ·
    10 months ago

    While I have little respect for Apple’s overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There’s no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn’t sit right with this.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      8
      ·
      10 months ago

      Well if Apple doesn’t fix it, like they haven’t fixed the iMessage flaws) they’ve known about for years, then it’s still useful.

      And most people won’t even know of this issue, and they’d still use Airdrop anyway, saying “I’m not interesting enough to spy on”.

      iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that’s just one issue with iMessage. And people don’t know about it, and still use it, thinking it’s secure. (it’s pretty good in my opinion, just wish Apple would fix the issues linked article).