Samsung’s more precise SmartTag+ uses AR to guide you to lost items

Trackers like Tile or Pixie have been helping us find lost keys and wallets for years now, but they aren’t all that precise beyond “it’s within Bluetooth range.” Samsung has now unveiled the Galaxy SmartTag+, the first tracker to use the more accurate … Continue reading Samsung’s more precise SmartTag+ uses AR to guide you to lost items

Encrypted method that measures encounters could slow down or prevent future pandemics

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of urgent efforts to fight COVID-19, a science is rapidly developing for mea… Continue reading Encrypted method that measures encounters could slow down or prevent future pandemics

Master & Dynamic launches its first ANC true wireless earphones

Luxury audio brand Master & Dynamic has announced a follow up to its MW07 true wireless earphones. The MW08 model brings a number of firsts for the company, including active noise cancellation.Continue ReadingCategory: Wearables, TechnologyTags: Earpho… Continue reading Master & Dynamic launches its first ANC true wireless earphones

Security Analysis of Apple’s “Find My…” Protocol

Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:

Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports. This paper presents the first comprehensive security and privacy analysis of OF. To this end, we recover the specifications of the closed-source OF protocols by means of reverse engineering. We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user’s top locations with an error in the order of 10 meters in urban areas. While we find that OF’s design achieves its privacy goals, we discover two distinct design and implementation flaws that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, which could deanonymize users. Apple has partially addressed the issues following our responsible disclosure. Finally, we make our research artifacts publicly available…

Continue reading Security Analysis of Apple’s “Find My…” Protocol