Airdrop:

May 2019 Germany - Technische Universität Darmstadt (German: Technische Universität Darmstadt) The vulnerability investigation team warned Apple that its AirDrop has a security flaw due to the old SHA-256 encryption, saying it started doing various reverse engineering research in 2017. July 2020 Apple said it "has not made any updates with new features or any changes to mitigate potential issues." October 2020 Three months later in the same year, the team sent the solution and sample code to the problem directly to Apple, and published the code publicly on GitHub in the form of a PrivateDrop demo. This method can prevent the hash value from being cracked.

https://github.com/seemoo-lab/privatedrop

image.png

2021 The team published a paper that takes a closer look at AirDrop security, pointing to a design flaw in Apple's AirDrop security.

https://www.usenix.org/system/files/sec21fall-heinrich.pdf

August 2021 The above paper was released at the USENIX security conference in August 2021. It is reported that Apple has received a complete copy of the paper and has expressed its gratitude to the Darmstadt team. January 2024 The team mentioned in an update on its GitHub homepage that "in January 2024, Chinese law enforcement authorities claimed to have "cracked" Airdrop" by using this security vulnerability.

image.png

Breaking and Fixing Apple AirDrop

image.png