Save 40% on 3 months of Coursera Plus
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a critical security vulnerability in Apple's Find My network through this 16-minute conference presentation from USENIX Security '25. Discover how researchers developed nRootTag, a novel attack method that can transform any Bluetooth-enabled computer into a trackable device similar to an Apple AirTag without requiring root privileges. Explore the technical details of this attack that achieves over 90% success rates within minutes at minimal cost, and understand how it exploits the world's largest device-locating network comprising over a billion Apple devices. Examine the cross-platform effectiveness of this vulnerability across Linux, Windows, and Android systems, and its implications for tracking desktops, laptops, smartphones, and IoT devices. Gain insights into the comprehensive evaluation methodology used to demonstrate the attack's effectiveness and efficiency across various scenarios, while understanding the substantial privacy and safety risks this poses to users worldwide.
Syllabus
USENIX Security '25 - Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into...
Taught by
USENIX