国产精品美女一区二区三区-国产精品美女自在线观看免费-国产精品秘麻豆果-国产精品秘麻豆免费版-国产精品秘麻豆免费版下载-国产精品秘入口

Set as Homepage - Add to Favorites

【?? ??? ??】Researchers discover AirDrop is leaking part of your phone number

Source:Global Hot Topic Analysis Editor:hotspot Time:2025-07-02 20:26:01

Apple's AirDrop is ?? ??? ??undeniably convenient for sending photos, videos, links, and more between iPhones, iPads, and Macs. But there's one thing you probably didn't know AirDrop's sharing: part of your phone number, which in the wrong hands, could be used to recover your full digits.

Security researchers at Hexway (via Ars Technica) have discovered a "flaw" in AirDrop that can used to obtain unsuspecting iPhone users' phone numbers using software installed on a laptop and a Bluetooth and WiFi adapter to sniff them out.

Because of the way AirDrop works — it uses Bluetooth LE (Low Energy) to create a peer-to-peer WiFi network between devices for sharing — it broadcasts partial hashesof an iPhone user's phone number in order establish the device as a sending/receiving contact when sending a file.

SEE ALSO: 9 hidden iOS 13 features you need to know about

More serious is if you use Apple's WiFi password sharing feature, you're exposing hashed parts of your phone number, but also your Apple ID and email address.

Now, although AirDrop's only beaming partial hashes – a.k.a. some numbers and letters that have been scrambled (Hexway says only the "first 3 bytes of the hashes" are broadcast) — the researchers concluded that there's "enough to identify your phone number" if somebody really wanted to do it.

The researchers shared one scenario in which a hacker could secretly sniff out iPhone users' phone numbers:

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

- Create a database of SHA256(phone_number):phone_number for their region; e.g., for Los Angeles it’s: (+1-213-xxx-xxxx, +1-310-xxx-xxxx, +1-323-xxx-xxxx, +1-424-xxx-xxxx, +1-562-xxx-xxxx, +1-626-xxx-xxxx, +1-747-xxx-xxxx, +1-818-xxx-xxxx, +1-818-xxx-xxxx)

- Run a special script on the laptop and take a subway train

- When somebody attempts to use AirDrop, get the sender’s phone number hash

- Recover the phone number from the hash

- Contact the user in iMessage; the name can be obtained using TrueCaller or from the device name, as it often contains a name, e.g., John’s iPhone).

Errata Security CEO Rob Graham confirmed to Ars Technica Hexway's software, shared to GitHub, does indeed work. "It’s not too bad, but it’s still kind of creepy that people can get the status information, and getting the phone number is bad."

Scary as this "flaw" appears, it's very unlikely anyone will go through these lengths to recover your phone number. Hexway's researchers even admit that the partially-shared — and we can't stress this enough — information is a necessity to how AirDrop works.

"This behavior is more a feature of the work of the ecosystem than vulnerability," reports Hexway. The researchers further explained that they've "detected this behavior in the iOS versions starting from 10.3.1 (including iOS 13 beta)."

Scary as this "flaw" appears, it's very unlikely anyone will go through these lengths to recover your phone number.

Older iPhones, pre-iPhone 6S, however, appear to be safe based on their findings.

"Old devices (like all before iPhone 6s) are not sending Bluetooth LE messages continuously even if they have updated OS version," reports Hexway. "They send only limited number of messages (for example when you navigate to the Wi-Fi settings menu) probably Apple does that to save battery power on an old devices."

So, how can you stop potential snoopers from sniffing your Bluetooth information out? Turn off Bluetooth. Yes, that means you won't be able to connect AirPods or an Apple Watch to your iPhone, but if that's what will help you sleep at night, then it's the only option.

We've reached out to Apple for comment on Hexway's security findings and will update this story if we receive a response.


Featured Video For You
Here are five hidden iOS 13 features you should know about

Topics Apple Cybersecurity iPhone Privacy

0.1894s , 9760.8828125 kb

Copyright © 2025 Powered by 【?? ??? ??】Researchers discover AirDrop is leaking part of your phone number,Global Hot Topic Analysis  

Sitemap

Top 主站蜘蛛池模板: 高清无码日本一区二区 | 91精品国产丝袜白色高跟鞋 | 97视频制服无码 | 午夜无码中文字幕在线 | 粉嫩小泬丝袜无套内射久久久 | 午夜激情啪啪 | 波多野结衣av无码 | 91国在线视频 | 97久久久精品综 | 91视频亚洲无码精彩视 | 一区二区三区在线 | 99久久无码一区人妻a片 | 午夜成人亚洲理论片在线观看 | 国产按摩全黄a一级毛片视频 | 91久久亚洲亚洲综合精品 | 福利一区二区久久 | 国产av剧情超级爽闺蜜 | 91精品国产乱码久久蜜臀 | 暴力调教一区二区三区 | av丝袜天堂久 | 91久久高清| 午夜精品一区二区三区在线观看 | 91导航在线观看 | 高清av一区二区三区在线观看 | 东京热heyzo无码专区 | 91久久综合一区二区三区桃色 | 韩国午夜无码片在线观看 | 国产4p视频在线播放 | 二区视频| av狠狠色超碰丁香婷婷综合久久 | 爱色吧影院 | 91新拍国产在 | 丰满人妻熟妇乱又伦精品 | 午夜久久久精品一区二区三区 | 91午夜精品免费视频 | 91福利国产视频 | 91人妻人人澡人人爽人人玩 | 91精产国品一二三区在线 | 91精品国产综合久久福利 | 丰满人妻熟妇av无码区a | 午夜性色福利免费视 |