Apple & Google’s Cross-Platform Feature Easing Detecting Unwanted Bluetooth Tracking Devices

0
Apple & Google's Cross-Platform Feature

Apple & Google’s Cross-Platform Feature Easing Detecting Unwanted Bluetooth Tracking Devices

On Monday, Apple and Google formally announced the release of a new feature that alerts users on iOS and Android devices when a Bluetooth tracking device is being used to surreptitiously monitor them without their knowledge or agreement.

Companies

“This will help mitigate the misuse of devices designed to help keep track of belongings,” the companies. It aims to address “potential risks to user privacy and safety.”

The cross-platform solution concept was first made public by the two IT behemoths precisely a year ago.

The feature, known as “Detecting Unwanted Location Trackers” (DULT), can be found on iOS devices with iOS 17.5, which was officially distributed yesterday, and Android devices running versions 6.0 and later.

According to the industry standard, Android users—regardless of the platform they are linked with—will get a “Tracker traveling with you” alert if an unknown Bluetooth tracking device is found to be traveling with them over time. The message “[Item] Found Moving With You” will appear to iOS users.

Users can then see the tracker’s identity, hear a sound to help locate it and get instructions to disable it, regardless of their OS system.

Companies

“This cross-platform collaboration — also an industry first, involving community and industry input — offers instructions and best practices for manufacturers, should they choose to build unwanted tracking alert capabilities into their products.”

The move is a reaction to allegations that bad actors are abusing trackers like AirTags for illicit or illegal intent. Domestic abusers frequently utilize these devices as devious monitoring tools to pursue their victims.

AirTags have evolved into “one of the most dangerous and frightening technologies employed by stalkers,” according to a class-action lawsuit against Apple filed in October 2023. The lawsuit further claimed that AirTags can be used to obtain “real-time location information to track victims.”

Through a technique known as multi-dealer secret sharing (MDSS), a team of researchers from the University of California, San Diego, and Johns Hopkins University developed a cryptographic strategy last year that provides a better trade-off between user privacy and stalker identification.

Academics, “Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.”

“MDSS extends standard secret sharing to admit multiple dealers with multiple secrets while achieving new properties of unlinkability and multi-dealer correctness.”

Apple Backports Fix for CVE-2024-23296#

ios

The DULT news also comes after Apple decided to backport to devices running previous iterations of iOS, iPadOS, and macOS a patch for a security hole in the RTKit real-time operating system (CVE-2024-23296), which was announced in March 2024.

The vulnerability has been actively exploited in the wild, albeit it is currently unknown what the technical details of these attacks entail. It allows an attacker with unrestricted kernel read and write capabilities to circumvent kernel memory protections.

The following versions have patches available to address the vulnerability:

  • iOS 16.7.8 and iPadOS 16.7.8 – iPad 5th generation, iPad Pro 9.7-inch, iPad Pro 12.9-inch 1st generation, iPhone 8, iPhone 8 Plus, and iPhone X.
  • macOS Ventura 13.6.7 – Macs with Ventura on macOS.

Additionally, 15 security vulnerabilities have been fixed by Apple with the iOS 17.5 update. These vulnerabilities include ones in AppleAVD (CVE-2024-27804) and the kernel (CVE-2024-27818) that might be used to execute arbitrary code or cause unexpected program termination. The macOS Sonoma 14.5 release has fixed the same two bugs.

one year cyber security diploma course

About The Author

Suraj Koli is a content specialist with expertise in Cybersecurity and B2B Domains. He has provided his skills for the News4Hackers Blog and Craw Security. Moreover, he has written content for various sectors Business, Law, Food & Beverage, Entertainment, and many others. Koli established his center of the field in a very amazing scenario. Simply said, he started his career selling products, where he enhanced his skills in understanding the product and the point of view of clients from the customer’s perspective, which simplified his journey in the long run. It makes him an interesting personality among other writers. Currently, he is a regular writer at Craw Security.

READ MORE ARTICLE HERE

Malicious Google Ads Used By FIN7 to Deliver NetSupport RAT

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish
Open chat
Hello
Can we help you?