{"id":41756,"date":"2024-01-11T14:22:58","date_gmt":"2024-01-11T19:22:58","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=41756"},"modified":"2024-01-30T11:02:11","modified_gmt":"2024-01-30T16:02:11","slug":"airdrop-log-dehashing","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2024\/01\/11\/airdrop-log-dehashing\/","title":{"rendered":"AirDrop Log Dehashing"},"content":{"rendered":"<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/china-claims-it-cracked-apples-airdrop-to-find-numbers-email-addresses\/\">Lawrence Abrams<\/a> (<a href=\"https:\/\/www.macrumors.com\/2024\/01\/09\/airdrop-cracked-chinese-authorities\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.bleepingcomputer.com\/news\/security\/china-claims-it-cracked-apples-airdrop-to-find-numbers-email-addresses\/\"><p>A Chinese state-backed research institute claims to have discovered how to decrypt device logs for Apple&rsquo;s AirDrop feature, allowing the government to identify phone numbers or email addresses of those who shared content.<\/p><p>[&#8230;]<\/p><p>To get around censorship in the country, people turned to Apple&rsquo;s AirDrop feature, which doesn&rsquo;t require cellular service and uses Bluetooth and a private Wi-Fi network to send images and photos between devices.<\/p><p>[&#8230;]<\/p><p>The research institute says the sender&rsquo;s device name, email address, and mobile phone number are hashed in the iOS device logs.<\/p><p>Using rainbow tables, the researchers claim to have been able to dehash these fields to gain access to the sender&rsquo;s information.<\/p><\/blockquote>\n<p>It&rsquo;s not clear to me why this information needs to be logged at all, nor why the government would want to alert Apple to fix this.<\/p>\n\n<p><a href=\"https:\/\/blog.cryptographyengineering.com\/2024\/01\/11\/attack-of-the-week-airdrop-tracing\/\">Matthew Green<\/a>:<\/p>\n<blockquote cite=\"https:\/\/blog.cryptographyengineering.com\/2024\/01\/11\/attack-of-the-week-airdrop-tracing\/\">\n<p>To make a long story short: a Private Set Intersection protocol takes a set of strings from the Sender and a set from the Receiver. It gives one (or both parties) the <em>intersection <\/em>of both sets: that is, the set of entries that appear on <span style=\"text-decoration: underline\">both<\/span> lists. Most critically, a good PSI protocol doesn&rsquo;t reveal <em>any other information about either of the sets.<\/em><\/p>\n<p>[&#8230;]<\/p>\n<p>For a variety of mildly defensible reasons &mdash; which I will come back to in a moment &mdash; Apple <em>does not use<\/em> a secure PSI protocol to solve their AirDrop problem. Instead they did the thing that every software developer does when faced with the choice of doing complicated cryptography or &ldquo;hacking something together in time for the next ship date&rdquo;: they threw together their own solution using hash functions.<\/p>\n<p>[&#8230;]<\/p>\n<p>A second important issue here is that the hash identifiers are apparently stored in logs within the recipient&rsquo;s phone, which means that to obtain them you don&rsquo;t have to be physically present when the transfer happens. You can potentially scoop them out of someone else&rsquo;s phone after the fact.<\/p>\n<p>[&#8230;]<\/p>\n<p>Hence there is a legitimate question about whether it&rsquo;s politically wise for Apple to make a big technical improvement to their AirDrop privacy, right at the moment that the <em>lack of privacy<\/em> is being viewed as an asset by authorities in China. Even if this attack isn&rsquo;t really that critical to law enforcement within China, the decision to &ldquo;fix&rdquo; it could very well be seen as a slap in the face. <\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/11\/11\/airdrop-everyone-limit-in-china\/\">AirDrop &ldquo;Everyone&rdquo; Limit in China<\/a><\/li>\n<\/ul>\n\n<p id=\"airdrop-log-dehashing-update-2024-01-30\">Update (2024-01-30): <a href=\"https:\/\/sixcolors.com\/post\/2024\/01\/airdrop-security-weakness-exploited-by-china\/\">Jason Snell<\/a>:<\/p>\n<blockquote cite=\"https:\/\/sixcolors.com\/post\/2024\/01\/airdrop-security-weakness-exploited-by-china\/\">\n<p>To a certain degree, Apple relies on stories like this staying under the radar. Inaction can be presented as either ignorance or tacit compliance, whereas taking steps to improve the privacy of AirDrop might be construed by Beijing as a challenge to its authority&mdash;a stick situation for Apple, given how much it relies upon its relationship with the country for the production of its devices. But Apple also makes privacy a <em>huge<\/em> selling point of its devices&mdash;a subject of ad campaigns, a highlighted section in virtually every keynote&mdash;and the company surely doesn&rsquo;t want to have to append an asterisk to all of those claims with the footnote &ldquo;Except in China.&rdquo;<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/edition.cnn.com\/2024\/01\/12\/tech\/china-apple-airdrop-user-encryption-vulnerability-hnk-intl\/index.html\">Sean Lyngaas and Brian Fung<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=38971811\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/edition.cnn.com\/2024\/01\/12\/tech\/china-apple-airdrop-user-encryption-vulnerability-hnk-intl\/index.html\">\n<p>Security researchers warned Apple as early as 2019 about vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users of the feature, the researchers told CNN, in a case that experts say has sweeping implications for global privacy.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Lawrence Abrams (MacRumors): A Chinese state-backed research institute claims to have discovered how to decrypt device logs for Apple&rsquo;s AirDrop feature, allowing the government to identify phone numbers or email addresses of those who shared content.[&#8230;]To get around censorship in the country, people turned to Apple&rsquo;s AirDrop feature, which doesn&rsquo;t require cellular service and uses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-01-11T19:23:02Z","apple_news_api_id":"99a6b73b-76df-47e5-9c2f-3c720494811f","apple_news_api_modified_at":"2024-01-30T16:02:15Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAQ==","apple_news_api_share_url":"https:\/\/apple.news\/Amaa3O3bfR-WcLzxyBJSBHw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[1003,1547,31,2321,30,2385,355],"class_list":["post-41756","post","type-post","status-publish","format-standard","hentry","category-technology","tag-airdrop","tag-china","tag-ios","tag-ios-17","tag-mac","tag-macos-14-sonoma","tag-privacy"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/41756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=41756"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/41756\/revisions"}],"predecessor-version":[{"id":41935,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/41756\/revisions\/41935"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=41756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=41756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=41756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}