China claims to have cracked AirDrop security to find senders' details
The state-backed Beijing Institute says it can now identify individuals sharing content over AirDrop.
AirDrop used to have an "Everyone" feature to allow anybody to send materials to an iPhone user
AirDrop can be used to share any files on an iPhone to anyone who either explicitly allows the sender to transmit them, or leaves AirDrop open to "Everyone." Seemingly under pressure from the Chinese government, Apple changed the latter option to "Everyone for 10 minutes," in 2022.
It's possible that the reason for that pressure was so that users would have to keep re-enabling AirDrop. That means anyone receiving material the Chinese government does not approve of, is less able to argue that they were unaware that material was being sent.
Now according to Bloomberg, the Beijing Institute claims to have cracked Apple's AirDrop security. It says that it can identify the phone numbers and email addresses of senders who share content over AirDrop.
"It improves the efficiency and accuracy of case-solving," a representative for Beijing's judicial bureau told the publication, "and prevents the spread of inappropriate remarks as well as potential bad influences."
The city judicial bureau also said that multiple suspects have already been identified using this new method. It has not announced whether any of those suspects have been arrested, or what charge there could be.
Apple has not commented on the claim. The Beijing Institute has also not commented on how the claimed hack is done, beyond saying that it involves the use of accessing an iPhone's encrypted device log.
That suggests that the iPhone that was sending or receiving material has to have been confiscated, but the Institute has not confirmed that.
This alleged breach of Apple security for AirDrop comes as China is increasing how much it controls its people's use of technology. While Apple initially resisted a new law covering the App Store, it is now enforcing the requirement that new apps have a licence from the Chinese government.
Read on AppleInsider
Comments
They're just trying to prevent the spread of dangerous misinformation like all freedom-supporting regimes do.
Quite the misnomer.
I read that and could not help but hope the poster simply forgot to include a sarcasm indicator.
It's so bad, that they are just throwing it in your face, publicly. bragging about it.
The company, perhaps more than any other, that got them here.
Time to leave China - even with the iPhone. It's already out of hand.
But here is Apple - "Oh, we will comply with. applicable. regional law." Even when it violates basic human rights that they. act like they represent. Have. to wonder if it's even really a hack - or if Their wasn't some assistance FROM Apple on this.
Shameful. all the way around.
I dig Apple products up to now, but completely baffled by their hypocrisy on the world stage.
They just aren't saying so publicly.
Then there's the law but that hasn't stopped them in the past, has it?
Apple (and everyone else) will simply try to 'tighten the bolts' if this actually proves to be true.
Apple moving out of China won't change things in the slightest.
And as you asked again. An iPhone doesn't actually need to know the phone number on its active SIM to work.