An AirDrop vulnerability puts your data at risk

AirDrop

AirDrop is one of those things that when you have the suite Apple products remind you why you have spent that huge amount of money in an environment of devices of the same brand, despite all this that your brother-in-law reminds you at every Christmas dinner that their Android + Windows do the same, but cheaper.

However, Not the whole mountain is oregano, as we have seen after a recent call to order regarding security. An alleged vulnerability in AirDrop makes data such as your mobile phone or email dangerously exposed.

Researchers from the Technisiche Universistat Darmstadt, discovered in May 2019 that the aforementioned vulnerability affected the wireless interaction between iOS and macOS. Despite the warnings, since then Apple has still not provided a solution to the affected devices, something that sincerely surprises us quite a bit considering how Apple has previously acted with this type of security problems, especially considering that they will soon two years after the discovery. According to the German researchers, the problem arises when we activate the AirDrop "Contacts only" function, that will show us (and we will appear) only those devices compatible with AirDrop of people who are in our agenda.

Despite the fact that the information sent is encrypted, something consistent with the privacy policies of the Cupertino company, Researchers believe that the system is not robust enough by Apple's usual standards. Perhaps this is the determining point by which Apple has not yet "solved" said vulnerability, understanding that it can only be intercepted while we are transmitting data (a short period of time) and has a light layer of encryption. This is why Apple may consider it safe enough or at least highly unlikely to be used.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.