top | item 43200108

(no title)

malmeloo | 1 year ago

No, they find the victim's MAC and generate a payload to broadcast from the victim's device, which will make the device appear to Apple devices as a genuine Airtag. Apple devices then upload location reports to Apple, and the attacker downloads them. No real Airtags are involved.

discuss

order

No comments yet.