Apple knew AirDrop users could be identified and tracked as early as 2019, researchers say | CNN Business (2024)

Apple knew AirDrop users could be identified and tracked as early as 2019, researchers say | CNN Business (1)

Employees stand in an Apple retail store in Grand Central Terminal, January 3, 2019 in New York City.

Editor’s Note: Sign up for CNN’s Meanwhile in China newsletter, which explores what you need to know about the country’s rise and how it impacts the world.

Washington CNN

Security researchers warned Apple as early as 2019 about vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users of the feature, the researchers told CNN, in a case that experts say has sweeping implications for global privacy.

The Chinese government’s actions targeting a tool that Apple customers around the world use to share photos and documents — and Apple’s apparent inaction to address the flaws — revive longstanding concerns by US lawmakers and privacy advocates about Apple’s relationship with China and about authoritarian regimes’ ability to twist US tech products to their own ends.

AirDrop lets Apple users who are near each other share files using a proprietary mix of Bluetooth and other wireless connectivity without having to connect to the internet. The sharing feature has been used by pro-democracy activists in Hong Kong and the Chinese government has cracked down on the feature in response.

A Chinese tech firm, Beijing-based Wangshendongjian Technology, was able to compromise AirDrop to identify users on the Beijing subway accused of sharing “inappropriate information,” judicial authorities in Beijing said this week.

Although Chinese officials portrayed the exploit as an effective law enforcement technique, internet freedom advocates are urging Apple to address the issue quickly and publicly.

“Apple’s response to this situation is crucial,” said Benjamin Ismail, campaign and advocacy director of Greatfire.org, a group that monitors internet censorship in China. “They should either refute the claim or confirm it and immediately work on securing AirDrop against such vulnerabilities. It’s imperative that Apple is transparent about their response to these developments.”

The Chinese claim has alarmed top US lawmakers. Florida Sen. Marco Rubio, the leading Republican on the Senate Intelligence Committee, called on Apple to act swiftly.

“Anyone using an iPhone should be concerned with the security of Apple’s AirDrop function,” Rubio told CNN. “This breach is just another way for Beijing to target any Apple user it perceives to be an opponent. The time to act is now, and Apple must be held accountable for failing to safeguard its users against such blatant security breaches.”

An Apple spokesperson did not respond to multiple emails and phone calls seeking comment.

A group of Germany-based researchers at the Technical University of Darmstadt, who first discovered the flaws in 2019, told CNN Thursday they had confirmation Apple received their original report at the time but that the company appears not to have acted on the findings. The same group published a proposed fix for the issue in 2021, but Apple appears not to have implemented it, the researchers said.

One of the researchers, Milan Stute, shared an email with CNN showing a representative of Apple’s product security team acknowledging the researchers’ report in 2019.

Precautions ‘not taken’

Chinese authorities claim they exploited the vulnerabilities by collecting some of the basic identifying information that must be transferred between two Apple devices when they use AirDrop — data including device names, email addresses and phone numbers.

Ordinarily, this information is scrambled for privacy reasons. But, according to a separate 2021 analysis of the Darmstadt research by the UK-based cybersecurity firm Sophos, Apple appeared not to have taken the extra precaution of adding bogus data to the mix to further randomize the results — a process known as “salting.”

That apparent failure allowed the Chinese tech firm to more easily reverse-engineer the original information from the encrypted data, in what seems to be “kind of an amateur mistake” by Apple, said Sascha Meinrath, the Palmer chair in telecommunications at Penn State University. “It certainly merits an explanation from Apple since it would point to a serious flaw in their technology.”

While AirDrop’s device-to-device communications channel is typically protected from third-party snooping by its own layer of security, that wouldn’t shield someone who may have been tricked into connecting with a stranger, perhaps by tapping on a deceptively named device in a list of contacts or by thoughtlessly accepting an unsolicited connection request. This step is required for the sender to be identified, according to security experts.

Once the device-identifying information is exchanged and obtained by an unauthorized third party, the lack of salting would make it straightforward to guess at the correct codes that would unscramble the data, the experts said.

The Chinese tech firm, Wangshendongjian Technology, that claimed to have exploited AirDrop appeared to have used some of the same techniques first identified by the Darmstadt researchers in 2019, said Alexander Heinrich, one of the German researchers.

“As far as we know, Apple did not address the issue so far,” Heinrich told CNN.

Kenn White, an independent security researcher specializing in digital forensics, agreed that what Chinese authorities disclosed about their hack is consistent with what the German researchers found.

“On my read, I’d say this is almost certainly using the same techniques that Heinrich et al published,” White said. “Three plus years and this design flaw appears not to have been addressed.”

Apple under pressure

On the heels of the Chinese claim, Sen. Ron Wyden, an Oregon Democrat and a vocal privacy advocate in Congress, blasted Apple over a “blatant failure” to protect its customers.

“Apple has had four years to fix the security hole in AirDrop that put the privacy and safety of its users at risk,” Wyden said in a statement to CNN. “Apple sat on its hands and did nothing, rather than protect human rights activists who depend on iPhones to share messages the Chinese government doesn’t want people to see.”

The tech firm behind the AirDrop exploit has a history of working closely with Chinese law enforcement and security authorities.

Its parent company is the powerful Chinese cybersecurity firm Qi An Xin, according to corporate database Aiqicha. Qi An Xin was hired to protect the Beijing Winter Olympic Games in 2022 from cyberattacks, according to the official Xinhua news agency.

“Time and again, the Chinese government turns to the private sector to augment its technical capabilities,” Dakota Cary, a China-focused consultant at US cybersecurity firm SentinelOne, told CNN. “This is an important reminder of the offensive role that ostensibly defensive Chinese cybersecurity companies can play.”

It is rare, however, for a government actor such as China to publicly disclose its capabilities, suggesting that the intentional reveal this week speaks to some other motive.

“It’s very much in their interests not to spill their techniques,” White said.

One reason Chinese officials may have wanted their exploit known, said Ismail, is that it could scare dissidents away from using AirDrop.

And now that the Beijing authorities have announced it exploited the vulnerability, Apple may face retaliation from Chinese authorities if the tech firm tries to fix the issue, multiple experts said.

China is the largest foreign market for Apple’s products, with sales there representing about a fifth of the company’s total revenue in 2022. Most of its iPhones are produced in Chinese factories, and Apple could face blowback from Beijing if it moves to close off the loophole.

The revelation of the hack could also give China even more leverage to force Apple to cooperate with the country’s security or intelligence demands, said Ismail, because China can argue Apple is already complicit.

“If Apple had fixed it when it was reported in 2019, it would’ve been a challenging technical problem,” said Matthew Green, a cryptography expert and professor at Johns Hopkins University. “Now that Chinese security agencies are exploiting this vulnerability, it’s a tough political problem for Apple.”

Apple knew AirDrop users could be identified and tracked as early as 2019, researchers say | CNN Business (2024)

FAQs

Apple knew AirDrop users could be identified and tracked as early as 2019, researchers say | CNN Business? ›

Security researchers warned Apple as early as 2019 about vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users of the feature, the researchers told CNN, in a case that experts say has sweeping implications for global privacy.

Can AirDrop be traced? ›

Can You See AirDrop History? No, Apple's AirDrop feature does not provide an option to view a history of the file transfers. Once a file is sent or received, there is no built-in functionality to track the log. You can only see the files in the destination where you saved them.

What is Apple's AirDrop security flaw? ›

Personal data leaks

The primary worry stems from AirDrop's contact functionality, which may inadvertently disclose personal details to unintended recipients. Whenever you share a file via AirDrop, the recipient device utilizes an encrypted process called Apple ID hashing to identify the sender.

Why did Apple restrict AirDrop? ›

At the height of protests, Apple placed heavy restrictions on AirDrop use in China, particularly on messages received from outside a user's contacts. Apple's never given a clear answer as to why, but it's pretty clear the company didn't want a system built for file transfers playing a role in a geopolitical upheaval.

Can AirDrop be hacked? ›

How secure is AirDrop, and does it have any security risks? AirDrop transfers are encrypted with TLS and Apple's other security measures, so using it generally poses little risk. The possible security flaw in using AirDrop comes with it being a peer-to-peer connection: human error and user behavior.

Did Apple know AirDrop users could be identified? ›

Apple knew AirDrop users could be identified and tracked as early as 2019, researchers say | CNN Business.

Are iPhone airdrops anonymous? ›

How to make AirDrop anonymous? Unfortunately, you can't make your AirDrop anonymous, but you can change your AirDrop name so others can't identify you. Is my AirDrop visible to everyone? Apple has kept your AirDrop visibility confined to your contacts only, but you can change it to everyone from settings.

What are the cons of AirDrop? ›

Potential cons of crypto airdrops

For example, one potential downside for crypto development teams is that they may end up giving a significant portion of their token supply to people who are only in it for the money, as opposed to those who legitimately believe in the long-term future of the cryptocurrency.

Is Apple restricting AirDrop? ›

A recent Apple software update limits the AirDrop file-sharing feature for users in China. Protests in China have attracted international attention as the greatest challenge of President Xi Jinping's premiership and a major knock to the Chinese Communist Party's (CCP) longstanding authority.

Are airdrops safe to accept? ›

With AirDrop, you can wirelessly send photos, videos, documents, and more to other nearby devices and Mac computers. Transfers are encrypted for security, and the recipient can accept or decline each transfer as it arrives.

Did Apple remove AirDrop everyone? ›

With the change, "Everyone" can still be enabled to allow users to receive content from anyone, but it will switch off after a 10 minute period, reverting to "Contacts Only." The tweak will require users to explicitly activate AirDrop to receive files and photos from strangers.

Why does my AirDrop say everyone for 10 minutes? ›

Everyone: All nearby Apple devices using AirDrop can see your device. When you set your AirDrop option to Everyone for 10 Minutes in iOS 16.2 or later, your option reverts to Contacts Only3 after 10 minutes.

Why is Apple limiting AirDrop in China? ›

Earlier that month, in an update to its operating system, Apple imposed a 10-minute time limit on exchanging AirDrop content via all iPhones sold in mainland China. This was seen as a move to prevent Chinese iPhone users from evading the country's strict web censorship.

What happens if you accept an AirDrop photo? ›

When someone shares something with you using AirDrop, you see an alert with a preview. You can tap Accept or Decline. If you tap Accept, the AirDrop will come through within the same app it was sent from. For example, photos appear in the Photos app and websites open in Safari.

What happens when you AirDrop a photo to someone? ›

With AirDrop, you can wirelessly send photos, videos, documents, and more to other nearby devices and Mac computers. Transfers are encrypted for security, and the recipient can accept or decline each transfer as it arrives.

What happens when someone airdrops you? ›

When someone shares something with you using AirDrop, you see an alert with a preview. You can tap Accept or Decline. If you tap Accept, the AirDrop will come through within the same app it was sent from.

How do I find something someone airdropped me? ›

On iPhone, AirDrop files go to the app that is associated with their file type, like Photos or Notes. On Mac, AirDrop files always go to your Downloads folder.

How to find someone with AirDrop? ›

Helpful hint: If the person you're sharing with is already in your Contacts, you'll see an image next to their name. If they're not in your Contacts, only their name will appear. You also need to remember to log into the iCloud if you've chosen to AirDrop to Contacts Only.

Top Articles
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6503

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.