Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> People might want to think about how AirTags and Find My Phone work...

rotating BTLE identifiers controlled by a pseudorandom sequence derived from a key, and tunneled over end to end encryption?



With locations over time tied to personal identifiers stored in a database with no public audit controls


Isn’t that already what every standardly configured smartphone does?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: