The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

  • WhatsThePoint@lemmy.world
    link
    fedilink
    English
    arrow-up
    122
    arrow-down
    8
    ·
    edit-2
    1 year ago

    Or China is just saying they cracked Air Drop to try to scare protestors from using this feature. If they cracked it, why would they make it public that they cracked it when they could catch dissidents using it without their knowledge? Not to mention making it public puts pressure on Apple to patch it, which would destroy their access. Doesn’t make much sense to make this public if it is true.

    • Dr. Dabbles@lemmy.world
      link
      fedilink
      English
      arrow-up
      98
      ·
      1 year ago

      Whenever a government or government agency announces a successful exploit, I presume they’ve already exhausted it and moved on to another one that won’t be patched or publicly divulged for many years.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        4
        ·
        1 year ago

        I don’t buy it. This smells like a way of causing fear in those who want to share information.

        • BearOfaTime@lemm.ee
          link
          fedilink
          arrow-up
          5
          arrow-down
          1
          ·
          edit-2
          1 year ago

          iMessage is insecure security isn’t as robust as most people think, and this has been known for years.

          People still use it

    • beta_tester
      link
      fedilink
      arrow-up
      23
      arrow-down
      1
      ·
      edit-2
      1 year ago

      It would be easy for apple to debunk this if it wasn’t true. I’d stay away from it and use proven secure means.

      • Ferk@kbin.social
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        edit-2
        1 year ago

        How can Apple debunk it?

        If I told you I know of a way by which I can “hack” the lock of your house to enter it, how can you prove whether I’m lying or not? Specially if I’m not willing to show you how I do it, and I haven’t given you any proof of having actually done it that you can try to dispute.

        • beta_tester
          link
          fedilink
          arrow-up
          5
          ·
          1 year ago

          sending email and phone number with each airdrop doesn’t sound right. Apple isn’t a good company but they aren’t dumb. Why would you send that info?

          • Ferk@kbin.social
            link
            fedilink
            arrow-up
            5
            ·
            edit-2
            1 year ago

            They aren’t saying that the email/number is part of the message. What the are saying is that they are able to decrypt the logs in order to identify the senders .

            It could be they cross-reference matching some internal ids / tokens / physical addresses of the devices together with all the data the Chinese government already has (or can obtain) …or it could be a bluff… who knows… there’s not enough information, and what we know is probably distorted.