this post was submitted on 10 Jan 2024
103 points (91.9% liked)

Technology

59627 readers
2911 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 20 comments
sorted by: hot top controversial new old
[–] Ghostalmedia@lemmy.world 65 points 10 months ago

Hot take - I’ll wager China is publicly announcing this so Chinese citizens stop trusting Airdrop. Intelligence organizations usually like to keep uncovered vulnerabilities private so they don’t get patched. And if there is a vulnerability, Apple will 100% patch that shit.

By sowing doubt in AirDrop’s security, that might be enough to get Chinese citizens to stop using it. And if enough people stop sharing or receiving, then that is going to kneecap it as a channel for dissent.

[–] Vub@lemmy.world 18 points 10 months ago (3 children)

So don’t go to China and if you do don’t send any important but unencrypted files via short-distance signal from one iPhone to another iPhone, gotcha.

[–] jonne@infosec.pub 14 points 10 months ago (1 children)

AirDrop has been used in China by pro-democracy activists to spread their message relatively safely (as you can't get away with that using the internet). Apple has already made AirDrop useless for that purpose in a recent update, but I guess China is still working on cracking down on it.

[–] Ghostalmedia@lemmy.world 6 points 10 months ago (1 children)

You can still use airdrop to send shit to people about how much the CCP sucks. Airdropping to non-contacts still exists, but when you enable receiving from any rando, that door only remains open for 10 minutes, then you have to open it again.

I guess the question is, do Chinese people keep tapping “everyone for 10 minutes” multiple times in certain public places?

[–] jonne@infosec.pub 6 points 10 months ago (1 children)

That's what I meant as it being useless now for that purpose. Unless there's designated dissent areas or times, that strategy just won't work any more (and if you have to be 'in the know' to enable it, you're not recruiting/convincing any new people).

[–] Ghostalmedia@lemmy.world 3 points 10 months ago (1 children)

I curious why China still cares about it. It seems like it would be hard for to spread info around on it now.

That said, if they still care about it, there must be some sort of use case that scares them.

[–] jonne@infosec.pub 2 points 10 months ago

Or they tasked a team with cracking it, they finally got a result and decided to announce it regardless, even if it is moot because the economic pressure on Apple worked.

[–] joyjoy@lemm.ee 8 points 10 months ago (1 children)

Apple disabled AirDrop in the China region, then later globally, for people not in your contacts.

In November 2022, [...] Apple began to limit AirDrop sharing with non-contacts for devices in China, which made it harder for users to share files with people they didn’t know. That feature was later expanded globally.

[–] Ghostalmedia@lemmy.world 10 points 10 months ago (2 children)

Correct, reviving files from everyone is now only open for 10 min. It was launched in China to appease the CCP, but in western nations where using airdrop to voice government dissent isn’t popular, it was released to stop people from airdropping dick pics on the subway.

[–] MSgtRedFox@infosec.pub 3 points 10 months ago* (last edited 10 months ago) (1 children)

airdropping dick pics in the subway

😆 Imagine the analog version of this... Dudes leaving random dick polaroids...

[–] Ghostalmedia@lemmy.world 3 points 10 months ago

I don’t have to imagine it. I’ve clocked in hours on BART. It’s just dudes whipping it out.

[–] xyla@lemmy.blahaj.zone 2 points 10 months ago

people would airdrop around weapons and stuff at my school which almost always ended with a lockdown

[–] Ghostalmedia@lemmy.world 6 points 10 months ago (1 children)

Thing is, the actual airdrop file transfer should be gated behind a 2048-bit RSA hash.

I’m curious to see what the security vulnerability is and how long it will remain open. China has been thirsting to find one for years.

[–] Vub@lemmy.world 3 points 10 months ago

I haven’t read anything about cracking the data itself though, just being able to identify the phone number of a sender. The infos they give is just too vague at this point.

[–] Nomad@infosec.pub 4 points 10 months ago (1 children)

No shit Sherlock. The encryption uses the phone number of the user for hashing. Building a rainbow table for all phone numbers is childsplay.

They use a weakness in the protocol to identify the senders number. They can't see what they send, but who sent something and when and to who.

[–] Ghostalmedia@lemmy.world 14 points 10 months ago* (last edited 10 months ago) (2 children)

Someone correct me if I’m wrong, but it looks like there are two hashes. A short one based on the iCloud account’s email address or phone number, and a long 2048-bit RSA identity that gets stored on the device after logging into iCloud.

It looks like the short identity is basically just used for that initial airdrop screen where you find available targets to airdrop to, but the actual longer, more secure, hash is required for the actual file transfer.

That might explain why finding airdrop contacts is kind of snappy, but there is a bit of a delay after you initiate a transfer.

https://support.apple.com/guide/security/airdrop-security-sec2261183f4/web

Edit: one more thought. If this really was that easy to crack, wouldn’t China have done this years ago? The CCP has been targeting Airdrop for a long long time.

[–] ripcord@lemmy.world 2 points 10 months ago (1 children)

Thank you, incidentally, for contributing so much to Lemmy. You are great.

[–] Ghostalmedia@lemmy.world 1 points 10 months ago

Thanks! Right back at ya!

[–] Nomad@infosec.pub 1 points 10 months ago

Sounds about right. Might be they have some man in the middle shenannigans going on with permanently installed hardware in the subway, but I doubt it. That would be a race condition that you might win with a lot more signal strength, but still...

[–] JCreazy@midwest.social 1 points 10 months ago

I had someone tell me that when they were on campus people would airdrop entire movies to either.