Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tracking You from a Thousand Miles Away - Turning a Bluetooth Device into an Apple AirTag Without Root Privileges

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a critical security vulnerability in Apple's Find My network through this 16-minute conference presentation from USENIX Security '25. Discover how researchers developed nRootTag, a novel attack method that can transform any Bluetooth-enabled computer into a trackable device similar to an Apple AirTag without requiring root privileges. Explore the technical details of this attack that achieves over 90% success rates within minutes at minimal cost, and understand how it exploits the world's largest device-locating network comprising over a billion Apple devices. Examine the cross-platform effectiveness of this vulnerability across Linux, Windows, and Android systems, and its implications for tracking desktops, laptops, smartphones, and IoT devices. Gain insights into the comprehensive evaluation methodology used to demonstrate the attack's effectiveness and efficiency across various scenarios, while understanding the substantial privacy and safety risks this poses to users worldwide.

Syllabus

USENIX Security '25 - Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into...

Taught by

USENIX

Reviews

Start your review of Tracking You from a Thousand Miles Away - Turning a Bluetooth Device into an Apple AirTag Without Root Privileges

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.