openhaystack
AirGuard
Our great sponsors
openhaystack | AirGuard | |
---|---|---|
67 | 72 | |
7,789 | 1,817 | |
2.8% | 1.4% | |
3.1 | 8.1 | |
about 1 month ago | 9 days ago | |
Swift | Kotlin | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
openhaystack
- Beeper Mini will add SMS & RCS, other services, and FaceTime in ‘near future’
- OpenHaystack is a framework for tracking personal Bluetooth devices via Apple's massive Find My network. Use it to create your own tracking tags that you can append to physical objects (keyrings, backpacks, etc)
-
Apple: Android is a tracking device [pdf]
> For Find My, since they can even locate switched off phones
They can't. Find My is actually truly end-to-end encrypted, at least the version used for when a device is off (I'm not 100% sure how encrypted the self-reported version is for powered on iPhones with data).
Copy-pasting my summary about how Find My works from another comment in this post:
> The master private key used by the system is generated locally and never leaves your Apple devices in a state that anyone except your devices can read it.
> The master key is used to derive an AirTag specific private key which is provisioned to the AirTag and is in turn combined with an increasing counter which generates a third private key that's never stored anywhere. The ID broadcast is the public key of this third key. It changes every 30 minutes or 1 hour, I forget which.
> Other devices see this key, use it to encrypt their own location, and upload that encrypted blob along with the public key to Find My, and in order for Apple to even know which account the encrypted blob they can't decrypt belongs to I have to actually request the location of my AirTag by locally deriving the keypair it used for a certain point in time.
This has all been proven through [1] where they read the whitepaper (which I can't for the life of me find now but know exist because I've read it, or at least parts) and implemented OpenHaystack which proves Apple aren't lying about anything because if they did then OpenHaystack wouldn't work.
1: https://github.com/seemoo-lab/openhaystack
- Find my cat: open-source Cat Tracker
- Where can I put a AirTag on my Flipper zero
- [Question] Is it possible to spoof an airtag location with an android device or some kind of Arduino configuration?
- My graduation thesis: Person Following Robot - Smart Trolley 🛒🛒🛒, which runs in real-time on Jetson Nano and can work in all complex types of floors with 3D Vision
-
J'ai trouver des Airpod dans sur la ligne L, est t-il possible de retrouver son propriétaire?
find my network
-
Kuba Wojciechowski: Google is working on a smart tracker similar to Apple's AirTag, codename "grogu"
Much more nuance than that. You can't just tap into the networks. More information here https://github.com/seemoo-lab/openhaystack
-
AirTags replacement
You can actually create your own, using Apple's "find my" network. See OpenHaystack
AirGuard
- Way to tell if there’s a tracker on my car?
-
NYPD urges citizens to buy AirTags to fight surge in car thefts
That's true for Apple's Tracker Detect app, but any thief could simply use the free and open source AirGuard app, which has more functionality than both Tracker Detect and the AirTag features built into iOS:
https://github.com/seemoo-lab/AirGuard
For example, AirGuard lets the user activate the alarm on any AirTag in range immediately without waiting any period of time. iOS and Tracker Detect only lets the user do this if it determines that the AirTag is following the user, and Tracker Detect adds another 10 minute waiting period for no good reason.
Good time to remind people that AirGuard exists.
- How to detect Samsung smartags
-
This new gadget could help sniff out unwelcome AirTags: Find the Bluetooth devices that could be tracking you
Apple doesn't develop the Android OS, it's up to the Android developers to integrate tracking bluetooth low energy devices if they so choose. They could simply integrate the open source project AirGuard, for example.
-
AirTag
use something like apple's tracker detect app or airguard (github) to check for other air tags, in case theru was more than one, then follow bigbadbuff's advice.
- Two women have filed a class-action lawsuit against Apple for AirTag stalking
-
Two women who allege they were stalked and harassed using AirTags are suing Apple
Yes! https://github.com/seemoo-lab/AirGuard
-
Apple sued by two women over AirTag stalking
Not natively. You need to install a specific app, for example:
- https://play.google.com/store/apps/details?id=com.apple.trac...
- https://github.com/seemoo-lab/AirGuard
-
Capturing Airtags beacons and messages.
The beacons should just use BLE. For Android there's an app that lets you detect beacons tracking you. You can check out the source code to see how they parse the packets https://github.com/seemoo-lab/AirGuard
What are some alternatives?
opendrop - An open Apple AirDrop implementation written in Python
anonaddy-android
bluesnooze - Sleeping Mac = Bluetooth off
darkmodewallpaper - 🌓 A live wallpaper for Android that respects dark theme mode 🌇
ubertooth - Software, firmware, and hardware designs for Ubertooth
SuntimesWidget - Android app (and widget collection) that displays sunlight and moonlight times.
Brooklyn - 🍎 Screensaver inspired by Apple's Event on October 30, 2018
Nekome - Nekome is an Android application to manage tracked Anime and Manga lists.
send-my - Upload arbitrary data via Apple's Find My network.
APK-Explorer-Editor - Source code of APK Explorer & Editor (AEE), an open-source tool to explore the contents of an installed APK!
BTLEmap - Nmap for Bluetooth Low Energy
retrowars - Play retro games against each other in any combination in this open source Android multiplayer game.