Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about a critical security vulnerability in Apple's Find My network through this 16-minute conference presentation from USENIX Security '25. Discover how researchers developed nRootTag, a novel attack method that can transform any Bluetooth-enabled computer into a trackable device similar to an Apple AirTag without requiring root privileges. Explore the technical details of this attack that achieves over 90% success rates within minutes at minimal cost, and understand how it exploits the world's largest device-locating network comprising over a billion Apple devices. Examine the cross-platform effectiveness of this vulnerability across Linux, Windows, and Android systems, and its implications for tracking desktops, laptops, smartphones, and IoT devices. Gain insights into the comprehensive evaluation methodology used to demonstrate the attack's effectiveness and efficiency across various scenarios, while understanding the substantial privacy and safety risks this poses to users worldwide.
Syllabus
USENIX Security '25 - Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into...
Taught by
USENIX