In recent times, the direct sharing of data between devices via Bluetooth, especially through the AirDrop channel in Apple devices, has been a target of regulatory control by Chinese authorities. This is because it is more difficult to track and monitor compared to other channels.
Recently, research units in Beijing claim to have discovered a method to extract data such as phone numbers, email addresses, and device names from both senders and recipients of images shared via AirDrop. They achieved this by extracting the data from device logs.
According to the research unit, the data of file senders via AirDrop is encrypted and stored in the device logs. However, the encryption can be decrypted using Rainbow Tables, a method that allows Chinese authorities to identify suspicious individuals if inappropriate content is disseminated.
To address these concerns, Apple has made adjustments to the AirDrop settings starting from iOS 16.1.1. Now, users can only receive files from anyone (Everyone) for a limited period of 10 minutes. Files cannot be kept pending indefinitely.
TLDR: Chinese authorities attempt to control direct data sharing between devices via Bluetooth, particularly through Apple’s AirDrop channel. Researchers claim they can extract personal information from AirDrop data by decrypting device logs. Apple has responded by limiting AirDrop file sharing to a 10-minute window and implementing encryption measures.
Leave a Comment