Apple's #Airtags are an ingenious technology: they fuse every Ios device into a sensor grid that logs the location of each tag, using clever cryptography to prevent anyone but the tag's owner from pulling that information out of the system.
But there are significant problems with Airtags' privacy model. Some of these are unique to Apple, others are shared by all Bluetooth location systems, including Covid exposure-notification apps and Airtag rivals like Tile.
1/
For example, minute imperfections in these devices' Bluetooth radio circuitry make it possible to uniquely identify them without having to bypass their encryption, simply by tracking the signature "fingerprint" of each radio:
https://pluralistic.net/2021/10/21/sidechannels/#ble-eding
That's an attack on the device's owner. But tracker tags also enable attacks *by* the device's owner.
2/
For example, there's a thriving market for Airtags whose speakers have been disabled (the speakers emit a chirp that is supposed to warn people if they are being tracked by someone else's Airtag):
https://9to5mac.com/2022/02/03/airtags-with-deactivated-speakers-being-sold/
Even without gimmicked speakers, tracking people with Airtags (and their competitors) is frighteningly easy. The *New York Times*' Kashmir Hill (consensually) tracked her husband around Manhattan with a constellation of these bugs.
https://www.nytimes.com/2022/02/11/technology/airtags-gps-surveillance.html
3/
Even with the chirping speakers, her husband - a press privacy advocate with a strong technical background - struggled to locate and de-activate the Airtags. Hill reports that many people - particularly women - are finding Airtags hidden in their cars, clothes and elsewhere.
4/
The far-reaching surveillance potential of these trackers was driven home by a stunt/investigation carried out by Lilith Wittmann, who confirmed her suspicion that a German government agency was a front for a spy operation, by mailing Airtag-bugged packages to it and watching as they were relayed to facilities used by the intelligence services ("the Office for the Protection of the Constitution").
5/
It's a fascinating new operational security wrinkle that relies on the popularity and ubiquity of Apple's Ios devices; foiling it requires not just that a spy facility be mobile-phone-free, but that all the facilities that deliver its mail also adopt this measure.
Image:
Apple
https://www.apple.com/airtag/
eof/