The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

  • WhatsThePoint@lemmy.world
    link
    fedilink
    English
    arrow-up
    84
    arrow-down
    6
    ·
    edit-2
    7 months ago

    Or China is just saying they cracked Air Drop to try to scare protestors from using this feature. If they cracked it, why would they make it public that they cracked it when they could catch dissidents using it without their knowledge? Not to mention making it public puts pressure on Apple to patch it, which would destroy their access. Doesn’t make much sense to make this public if it is true.

    • Dr. Dabbles@lemmy.world
      link
      fedilink
      English
      arrow-up
      73
      ·
      7 months ago

      Whenever a government or government agency announces a successful exploit, I presume they’ve already exhausted it and moved on to another one that won’t be patched or publicly divulged for many years.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        3
        ·
        7 months ago

        I don’t buy it. This smells like a way of causing fear in those who want to share information.

      • Ferk@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        How can Apple debunk it?

        If I told you I know of a way by which I can “hack” the lock of your house to enter it, how can you prove whether I’m lying or not? Specially if I’m not willing to show you how I do it, and I haven’t given you any proof of having actually done it that you can try to dispute.

          • Ferk@kbin.social
            link
            fedilink
            arrow-up
            1
            ·
            7 months ago

            They aren’t saying that the email/number is part of the message. What the are saying is that they are able to decrypt the logs in order to identify the senders .

            It could be they cross-reference matching some internal ids / tokens / physical addresses of the devices together with all the data the Chinese government already has (or can obtain) …or it could be a bluff… who knows… there’s not enough information, and what we know is probably distorted.

  • hottari@lemmy.ml
    link
    fedilink
    arrow-up
    28
    arrow-down
    6
    ·
    7 months ago

    Apple has been taking massive Ls after Ls wrt the security of their iPhones in recent times. It’s almost as if magically branding your products “private and secure” doesn’t work.

    • ExLisper@linux.community
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      7 months ago

      Finding an exploit created by state-level actor is not a massive L. They have shown in the past that they are able to hack air gaped systems, weaken commonly used security standards and implant vulnerabilities into commercial software. I don’t think you will find a company that is immune to this. Other than that, did they really have so many security issues recently?

      • redfellow@sopuli.xyz
        link
        fedilink
        arrow-up
        6
        arrow-down
        2
        ·
        edit-2
        7 months ago

        Ordering your hardware from China makes it a tad bit easier to shoehorn backdoors in it.

      • hottari@lemmy.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        7 months ago

        Read the article. The exploit was found by the state actors not created by them. Apple is ultimately responsible for the mishap due to the insecure design of the aforementioned feature.

        Even though China partially had a hand in the creation of this flaw according to the history of the feature.

        And yes, Apple has been a constant feature on the news for such privacy leaks of late. You just haven’t been paying attention.

        • ExLisper@linux.community
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 months ago

          If state actor would create it it would be a backdoor. Exploits are by definition bugs/security issues that can be… well, exploited and state-level actors are really good at finding them. Still, if it takes resources of state actor to find an exploit I don’t think it’s a massive L. Yes, it’s totally possible they had some other serious security issues recently and I haven’t been paying attention. That’s why I’m asking.

  • Optional@lemmy.world
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    7 months ago

    Usually when one of Apple’s security measures is breached, the company would issue an update to patch it. We’d hope this will happen here, but the Chinese government is likely to apply pressure on the iPhone maker to leave the exploit unpatched – at least, on Chinese devices.

    WELL, Apple? ? . . . We’re waiting

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    7 months ago

    Probably not a reliable source but you should still use Foss with strong encryption (RSA2048+ ideally)

  • Bappity@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    7 months ago

    only reason that I can see why they’re saying they’ve done this has to be some kind of scare tactic

    would be a bit stupid to reveal this hand otherwise

  • Southern Wolf@pawb.social
    link
    fedilink
    arrow-up
    5
    arrow-down
    3
    ·
    7 months ago

    While I have little respect for Apple’s overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There’s no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn’t sit right with this.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      2
      ·
      7 months ago

      Well if Apple doesn’t fix it, like they haven’t fixed the iMessage flaws) they’ve known about for years, then it’s still useful.

      And most people won’t even know of this issue, and they’d still use Airdrop anyway, saying “I’m not interesting enough to spy on”.

      iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that’s just one issue with iMessage. And people don’t know about it, and still use it, thinking it’s secure. (it’s pretty good in my opinion, just wish Apple would fix the issues linked article).

  • kworpy@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    3
    ·
    7 months ago

    You guys are gullible as shit if you think this is real. This is yet another bullshit scare tactic by the Chinese government. Also these articles are hardly even sourced and are just copypasted from other news sites to farm clicks.

    • WebTheWitted@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      7 months ago

      Ahh, that makes sense. I was wondering, “Why the hell are they announcing their zero day to the Internet?”

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      7 months ago

      Yeah this does smell fishy. The Chinese government is quick to manipulate and lie and I doubt they would want to get people not to use a service they can break.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        edit-2
        7 months ago

        I think we should use Foss software because no single entity can be trusted.

        And just to be clear, China is very much bad. I’m not sure why you are suddenly complaining about the US. Also I’m pretty sure China - US relations are not great so I’d imagine the CIA isn’t exactly in league with China. Just look at the number of Pandas in the US.

      • Night Monkey@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        arrow-down
        2
        ·
        7 months ago

        I agree. I’m just referring to China since this article is. They claim they figured it out but really they already have the keys to the backdoor. It was a requirement that Apple provided it to China before Apple devices could be sold in China.

      • Aatube@kbin.social
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        edit-2
        7 months ago

        CIA shell company? Hah, as if they’d base all their logistics in China. Nobody said the USA was better.