Hacking Apple’s Find My Network: The Silent Bluetooth Tracking Exploit Exposed

Apple’s Find My Network Exploit Researchers at George Mason University have discovered a significant exploit in Apple's Find My network that allows hackers to silently track any Bluetooth device, effectively turning them into AirTags. This exploit, named 'nRootTag,' has a 90% success rate and can be used without sophisticated privileges. The researchers were able to track devices with an accuracy of 10 feet, demonstrating the potential for stalking and tracking individuals.
How It Works
The Find My network sends Bluetooth messages from AirTags and other trackers to nearby Apple devices, which then share the location with the owner via Apple’s servers. The researchers found a way to quickly match cryptographic keys for Bluetooth addresses using hundreds of GPUs, allowing them to track any Bluetooth device through this network.
Implications
This exploit raises serious privacy concerns. In experiments, the team tracked a bicycle and reconstructed a person's flight path by tracking their game console. The researchers informed Apple in July 2024, but as of now, there is no fix available. A true solution may take years to roll out due to slow user adoption of software updates.
Recommendations
To protect against this exploit, users are advised to:
- Never allow unnecessary Bluetooth access to apps.
- Keep device software updated regularly.
Latest News

xBloom Studio: The Coffee Maker That Puts Science in Your Cup
2 weeks ago

Matter 1.4.1 Update: Daniel Moneta Discusses Future of Smart Home Interoperability on HomeKit Insider Podcast
2 weeks ago

OWC Unleashes Thunderbolt 5 Docking Station with 11 Ports for M4 MacBook Pro
2 weeks ago

Nomad Unveils Ultra-Slim 100W Power Adapter for On-the-Go Charging
2 weeks ago

iOS 19 Set to Debut Bilingual Arabic Keyboard and Virtual Calligraphy Pen for Apple Pencil
2 weeks ago

Big Tech Lawyers Accused of Encouraging Clients to Break the Law
2 weeks ago