TTB White LOGO TB
  • News
  • PC & Hardware
  • Mobiles
  • Gaming
  • Electronics
  • Gadget
  • Reviews
  • How To
Trending
Quick Keys in macOS Tahoe: Type Less, Do More With Spotlight
Post-Quantum Cryptography Explained Simply
Modular Cameras – How They Work and Why They Matter
Why Modular Phones Failed to Change the Smartphone Game
What is Calm Technology and Why it Matters in a Busy World
Saturday, Jun 14, 2025
The Tech BasicThe Tech Basic
Font ResizerAa
Search
  • News
  • PC & Hardware
  • Mobiles
  • Gaming
  • Electronics
  • Gadget
  • Reviews
  • How To
Follow US
Apple AirTags Experts Propose Solution to Enhance Privacy
The Tech Basic > Gadget > Apple AirTags: Experts Propose Solution to Enhance Privacy
GadgetNews

Apple AirTags: Experts Propose Solution to Enhance Privacy

Evelyn Blake
Last updated: 29 December 2023 07:53
Evelyn Blake
Share
SHARE

The use of AirTags has brought forth various privacy concerns. By the end of 2022, it surfaced two women had filed complaints against Apple after their ex-partners had spied on them using this accessory. Various methods exist to detect stalking. Researchers from Johns Hopkins University and the University of California have devised a solution to enhance the security of these Cupertino-made tracking devices.

Contents
AirTags: Vulnerable on Privacy FrontResearchers Advocate for Secret Sharing

Please follow us on Twitter and Facebook

AirTags: Vulnerable on Privacy Front

To recap, AirTags rely on the encrypted and anonymous network called “Find My,” comprised of hundreds of millions of Apple devices worldwide. They interact via Bluetooth, indicating their positions to iCloud. The data solely belongs to the user, ensuring their privacy. However, malicious individuals (thieves, jealous partners, etc.) have frequently misused this Apple-conceived device.

Read Also: iPhone 16: All Vital Rumors And Leaks About The New Apple Phone

Hence, multiple researchers have devised a cryptographic solution that, in their view, could prevent tracking of individuals by ill-intentioned users leveraging an AirTag. Currently, the accessory emits a sound after a certain period when distanced from its owner. The iPhone even alerts the owner to this situation. Yet, this doesn’t deter stalkers who exploit this time lapse to act.

Apple AirTags Experts Propose Solution to Enhance Privacy (1)

Researchers Advocate for Secret Sharing

The researchers term their cryptographic solution “secret sharing,” safeguarding confidential information, accessible only when specific conditions are met. For AirTags, this concerns the true static identity hidden beneath the frequently changing public identifier. They make this alteration for privacy reasons.

Read Also: AirPods 2024: Anticipating These New Apple Headphones

In simpler terms, it’s akin to the accessory donning a constantly changing mask to avoid recognition—the public identifier. Only when specific conditions are met does it disclose the true static identity, ensuring the user’s confidentiality and security. This solution would notably impede malicious tracking of an AirTag over time. It achieves this by constantly changing the public identifier, making it lose its trail.

Experts don’t stop at suggesting secret sharing. They also advocate for ‘error-correcting code,’ a technique to maintain signal quality by separating useful data from noise, even amid errors or interference.

Read Also: Apple Reportedly Considering iPad With Foldable OLED Display

TAGGED:Apple
Share This Article
Facebook Reddit Copy Link Print
Share
Evelyn Blake
By Evelyn Blake
Follow:
Evelyn Blake is an investor in technology and journalist who has been in the nascent space since 2014. Her love and passion for technological innovations made her delve deeper into the world of technology evolution. As a journalist, Evelyn has been covering latest trends and emerging gadgetries. She is a philanthropist and human rights activist.

Let's Connect

FacebookLike
XFollow
PinterestPin
InstagramFollow
Google NewsFollow
FlipboardFollow

Popular Posts

macOS Tahoe

Quick Keys in macOS Tahoe: Type Less, Do More With Spotlight

Salman Akhtar
Post-Quantum Cryptography

Post-Quantum Cryptography Explained Simply

Salman Akhtar
Modular Cameras

Modular Cameras – How They Work and Why They Matter

Salman Akhtar
Modular Phones

Why Modular Phones Failed to Change the Smartphone Game

Salman Akhtar

You Might Also Like

Apple AI
News

Apple AI Roadmap: Contextual Siri 2026, Knowledge Chatbot & Copilot

iOS 26
News

Your Photos Reborn: iOS 26’s Tabbed Interface and AI-Powered 3D Revolution

Logitech
GadgetNews

New from Logitech: Sleek iPad Case with a Compact, Removable Wireless Keyboard

Child Accounts
News

iOS 26 Introduces Smarter Management Tools to Safeguard Child Accounts

Social Networks

Facebook-f Twitter Instagram Pinterest Rss

Company

  • About Us
  • Our Team
  • Contact Us

Policies

  • Disclaimer
  • Privacy Policy
  • Cookies Policy
Latest
Inside the Terahertz Communication – How 6G Will Reshape Wireless Connectivity
Meta Slams Down on Nudify Apps After Critical Exposure
Apple Music in iOS 26 Redefines the Lock Screen with Stunning Motion, Color, and Depth
iOS 26 vs iOS 18: Is Apple’s Liquid Glass the Future of UI?
Google Fixes Account Security Hole That Enabled Phone Number Harvesting

© 2024 The Tech Basic INC. 700 – 2 Park Avenue New York, NY.

TTB White LOGO TB
Follow US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?