WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

568

Archive: https://archive.today/ahBYF

From the post: "Apple's "Find My" tracking network is useful for tracking down lost items with an AirTag attached. However, malicious actors can misuse it to leak data. A keyboard with a keystroke logger built by IT security expert Fabian Bräunlein now demonstrates that this actually works on a larger scale. Using such a device, malicious attackers could spy out passwords and send them to themselves - unnoticed, bypassing all security measures in the local network, via the iPhones and other Apple devices of uninvolved persons in the vicinity - a clearly punishable act under criminal law in many countries."

Archive: https://archive.today/ahBYF From the post: "Apple's "Find My" tracking network is useful for tracking down lost items with an AirTag attached. However, malicious actors can misuse it to leak data. A keyboard with a keystroke logger built by IT security expert Fabian Bräunlein now demonstrates that this actually works on a larger scale. Using such a device, malicious attackers could spy out passwords and send them to themselves - unnoticed, bypassing all security measures in the local network, via the iPhones and other Apple devices of uninvolved persons in the vicinity - a clearly punishable act under criminal law in many countries."

(post is archived)