Skip to main content

Researchers Suggest Innovative Methods To Enhance Security And Privacy For Apple’s AirTag

 AirTag from Apple is another name for a Bluetooth tracker that is designed to ensure users can keep track of their devices and belongings at all times.


However many questions have been raised in terms of how it manages to balance security and user privacy at the same time.

Some reports have suggested how AirTag can be a balancing act as the last thing you need is for the tool to track your whereabouts and lead others in on the sensitive information. After all, who needs stalking when the world is already so unsafe as it is?
The latest research paper discussing this aspect has led to a world of new possibilities in terms of how security and privacy can be further enhanced, giving users the best of both worlds with no compromise on their safety.

The balance is certainly not easy but the goal can be achieved with a few changes, the experts mentioned.

There are some major differences between calling for privacy when on the move and the need for spotting out rogue AirTags. When you make use of other kinds of tools, stalkers are not following the victim. They get access to them by devising a means to cross paths with them or abandon the tools in some other location that they are certain would be crossed by the victim. But stalking AirTags are tools going with their respective victims.


Researchers settled on systems entailing privacy as well as avoiding the issue of stalkers. The first method dubbed secret sharing is designed to create a secret in the system that is shared similar to how a puzzle works. You can find a solution to the whole puzzle after encountering tracker devices several times so that the secret is out.
When you come across the tracking tool, there just will not be enough information shared for stalkers to have know-how about movements. But when the tool is slipped through your vehicle, it might give out more details that reveal itself. It’s going to be the same no matter how frequently the tool updates the identifier in public.


There are disadvantages linked to this front though. Noise cannot be handled well when algorithms are shared. If for instance, the tool bypasses several AirTags along the way, it might attain pieces arising from various puzzles. And therefore, it cannot figure out which piece belongs where.

Therefore, researchers are now implementing another second stage to fix that. It’s known as the error correction coding that is designed to sort out data specifically and assist with separating all kinds of puzzles so the device can play with data that is not crucial like joggers with AirTags that you may have come across once, ensuring all pieces deemed necessary are kept.

The research really goes to show how so many people have struggled with creating a balance between security and privacy. Bluetooth trackers aren’t something new but they have been present for a very long time now. However, the revolutionary aspects that tech giant Apple brings forward are rarely found elsewhere.

So many companies made big promises in the past but never delivered. It was like watching trackers reach out to devices featuring the app from the manufacturer so the exact location could be determined.

AirTags did not go down that path. They ended up showcasing locations to those with iPhone devices that showed compatibility through Find My Network. And the latter made the biggest difference. All of a sudden, Bluetooth trackers were doing a great job in terms of accuracy. And that led other big names in the tech world to get inspiration and come up with similar offerings.

Photo: Unsplash/Daniel Romero

Comments

Popular posts from this blog

Is Google Sunsetting Gmail In 2024? New Hoax Leaves Users Confused

  Rumors are going strong on social media about Google’s journey with Gmail coming to an end. And that too as early as this year. If you paid witness to such a shocking hoax that’s fast spreading online too then we can confirm that it’s not true by any means. The Android maker is addressing the need for users to calm down after the hoax emphasizing the company’s goodbye to Gmail. Many versions of this hoax can be found online  on the Twitter (X) app . But Google has rest assured everyone to take it easy and that it’s not going anywhere. However, a clause also mentions how users would now be defaulted to new views on Gmail. So other than those cases where you had specifically requested for the basic HTML version, nothing is going to change. The search engine giant  just made  updates to its respective  support page  too instead of this hoax and how it will now change to Standard display after the issuance of a deadline date. Reports by users on tech outlet...

Telegram is Home to Many Scammers and Cyber Criminals Who Sell Many Phishing Tools at Cheap Prices

  Telegram is a popular messaging app that has over one billion downloads and 700 million monthly users. However, this popular app is quite known for its selling and buying of phishing kits that scam users and sell their harmful wares. A cybersecurity startup, Guardio, published  a report  that sheds light on some phishing tools on Telegram. It was revealed that there are some harmful kits available on Telegram that can easily hack users’ social media and bank accounts logins. Guardia said that Telegram is a scammer’s heaven due to easy access and cheap prices of many phishing tools. There are also many phishing groups on Telegram where different scammers share data with other scammers and use phishing tools for hacking and phishing. For a few years, Telegram has become a home to many seasonal scammers and newcomers who sell malicious tools to steal the data of people. Some of the expensive phishing tools on Telegram also let the scammers create fake pages that easily byp...

200,000 Private Records From Facebook’s User Database Stolen, Hackers Forum Confirms

  A hacker has just raised the alarm amongst Facebook users after confirming that 200,000 personal data record entries were reportedly stolen from the firm’s database. The news is alarming for obvious reasons as the claims further went on to delineate how the cybercriminal dubbed ‘alogoatson breached contractors’ efforts that are in charge of Facebook’s cloud services. They stole part of the user database that featured a significant number of entries. The information was rolled out by a leading threat actor dubbed ‘IntelBroker’ which is notorious for a long list of leaks that entailed data stolen through General Electric and a long list of high-profile attacks taking place. This sample entails lists featuring full names, profile image links, and hashed passwords. Other than that, profile ratings, settings, and plenty of reviews were on display. The hacker explained how the data that was compromised included the likes of Physical IDs. This database was first rolled out in February a...