From holiday photos to music files, Airdrop is a popular feature to send documents between Apple apparatus since released in 2011.
But new concerns have emerged about the security of the technology that may set you off with it.
Airdrop Works by utilizing Bluetooth and Wifi to make a peer to peer connection. This requires a network protocol, giving rules for the way devices communicate, known as the Apple Wireless Direct Link.
It’s Been designed for high performance, with low latency and high speed. Around the 1.2 billion Apple devices that have AWDS, it uses a firewall around the connection to enable file transfer without email or a hard disk.
However last week, security company Hexway revealed the data AWDS broadcasts can easily be decrypted. This is presently sent in’Bluetooth Low Energy Packets’ (BLE) which expose sufficient information to be converted into identifying information.
In a minute long video, Researchers were able to run software to spot local users of Airdrop and regain their contact number.
More Alarmingly, they demonstrated issues with Apple’s Wifi password sharing. This means that the BLE could be used to expose a target’s telephone number, AppleID and email.
Demonstrating Hexway’s research, Errata Security CEO Robert Graham Managed to sit at a bar equipped with a laptop and a”sniffing dongle.” Within two minutes, he was able to seek out information from all nearby Apple devices.
Speaking to the technology website, Ars techinca research explains this is the timeless trade-off when balancing ease of use vs privacy/ safety.
Often these sort of technologies demand the exchange of private information so as to make them work.
Luckily, Apple has become aware of these vulnerabilities and contains mended them.