this post was submitted on 23 May 2024
169 points (96.2% liked)

Technology

59235 readers
3449 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Apple's huge database, which usually records the locations of Wi-Fi base stations to the nearest metre, has apparently been exploited without hindrance: With little effort, attackers are able to create a ‘global snapshot’ of all the location data of the WLANs recorded there. This allows them - over a longer period of time - to track changes in the location of the routers usually belonging to a household or sometimes even of individuals, as two researchers from the University of Maryland have now demonstrated.

The researchers consider it particularly problematic that Apple's Wi-Fi database can be read out practically unhindered and immediately provides the location data for ‘several hundred’ additional BSSIDs (the physical MAC addresses of the routers) to the requesting client without being asked via an apparently unlimited API. In this respect, Apple's Wi-Fi database also differs fundamentally from other Wi-Fi databases, such as the one operated by Google.

you are viewing a single comment's thread
view the rest of the comments
[–] Boddhisatva@kbin.social 15 points 5 months ago (1 children)

I'm sure they are also pretty effective for people with more nefarious uses for them.

[–] Darkassassin07@lemmy.ca 3 points 5 months ago* (last edited 5 months ago)

Certainly. I'm not saying they're a good thing; just lending credence to their existence.

Though I'll note; to use them you need access to the wifi radio carried by the individual you're tracking. Ie; you've already hacked their device.