• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Donate
  • Start
    • Contact
    • We Need Your Support (Donate)
    • Newsletter Signup
      • Daily
      • Weekly
    • Into the Storm (Hosted by Justin Deschamps)
    • Follow Our Social Media
    • Best Telegram Channels & Groups
    • Discernment 101
    • Media Archive (Shows, Videos, Presentations)
    • Where’s The Hope
  • Browse
    • Editor’s Top Content (Start Here)
    • Best Categories
      • Consciousness
      • Conspiracy
      • Disclosure
      • Extraterrestrials
      • History
      • Health
      • NWO Deep State
      • Philosophy
      • Occult
      • Self Empowerment
      • Spirituality
    • By Author
      • Justin Deschamps
        • Articles
        • Into The Storm (on EdgeofWonder.TV)
        • Awarewolf Radio (Podcast)
      • Adam AstroYogi Sanchez
      • Amber Wheeler
      • Barbara H Whitfield RT and Charles L Whitfield MD
      • Chandra Loveguard
      • Conscious Optimist
      • Marko De Francis
      • Lance Schuttler
        • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
      • Ryan Delarme
      • Will Justice
  • Products
    • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
    • Earth Science & Energy
    • Free Energy
    • AI and Transhumanism
    • Space
    • Nikola Tesla
    • ET
      • Ancient Technology
      • Crop Circles
      • UFOs
    • Conspiracy
      • Anti NWO Deep State
      • Domestic Spying
      • Freemasonry
      • Law & Legal Corruption
      • Mass Mind Control
      • NWO Conspiracy
      • Police State and Censorship
      • Propaganda
      • Snowden Conspiracy
      • Social Engineering
    • Misc.
      • Council on Foreign Relations
      • Music Industry
      • Paranormal
      • Pedagate and Pedophilia
      • Q Anon
      • Secret Space Program
      • White Hat
  • Sign Up
  • Election Fraud
  • Partners
    • EMF Harmonized
    • Ascent Nutrition

Stillness in the Storm

An Agent for Consciousness Evolution

  • Our Story
  • Support Us
  • Contact
  •  Sunday, February 1, 2026
  • Store
  • Our Social
    • BitChute
    • CloutHub
    • Gab
    • Gab TV
    • Gettr
    • MeWe
      • MeWe Group
    • Minds
    • Rumble
    • SubscribeStar
    • Telegram
      • Best Telegram Channels and Groups
    • Twitter (Justin Duchamps)
    • YouTube

Hacker Cracks Apple’s New Gadget, Now Worried What He Found Inside Could Be Used to Spy on Us

Thursday, May 27, 2021 By Stillness in the Storm Leave a Comment

Spread the love

(C. Douglas Golden) Keep losing your keys? There’s an Apple device for that: the new AirTags, which can be attached to things you frequently lose so you can find them easily.

Related Biden Violates His Own Mask EO by Failing to Wear Mask For Photo-Op

Source – The Federalist Papers

by C. Douglas Golden, May 16th, 2021 

“AirTag is a supereasy way to keep track of your stuff,” Apple’s website reads.

“Attach one to your keys, slip another in your backpack. And just like that, they’re on your radar in the Find My app, where you can also track down your Apple devices and keep up with friends and family.”

https://twitter.com/iamalfern/status/1393605097674924038?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1393605097674924038%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.westernjournal.com%2Fapples-tiny-new-gadget-turns-nightmare-us-hacker-breaks-reveals-thinks-can%2F

According to Apple’s website, the $30 tag “sends out a secure Bluetooth signal that can be detected by nearby devices in the Find My network. These devices send the location of your AirTag to iCloud — then you can go to the Find My app and see it on a map. The whole process is anonymous and encrypted to protect your privacy. And itʼs efficient, so thereʼs no need to worry about battery life or data usage.”

Unfortunately, that’s not quite the only thing the AirTag can do, as Vice’s Motherboard noted in a Thursday story.

Thomas Roth, who goes by the online sobriquet Stacksmashing, told the publication he found a way to hack into the hardware of the AirTag and have it send a malicious NFC, or near-field communication, signal to your device. If it comes close enough to your iPhone, it can direct it to a malicious URL.

Yesss!!! After hours of trying (and bricking 2 AirTags) I managed to break into the microcontroller of the AirTag! 🥳🥳🥳

/cc @colinoflynn @LennertWo pic.twitter.com/zGALc2S2Ph

— stacksmashing (@ghidraninja) May 8, 2021

Here’s Roth demonstrating it in a decidedly non-malicious way, by using the AirTag to “Rickroll” an iPhone. (If you don’t know what the “Rickrolling” meme is, I’m not quite sure whether to consider you out of the loop, lucky or both. Basically, it’s a prank where you pretend you’re sending someone a link to an important or on-topic article. Instead, you’re sending them a link to the music video for the 1987 Rick Astley hit “Never Gonna Give You Up,” which hasn’t aged well.)

Be careful when scanning untrusted AirTags or this might happen to you😆 pic.twitter.com/LkG5GkvR48

— stacksmashing (@ghidraninja) May 9, 2021

“The AirTags ship in a state where you can not access the internal processor/microcontroller, because during manufacturing they locked the debug interfaces,” Roth told Vice in an online chat. “I managed to re-activate the debug interface and dump the firmware from the AirTag.”

“Honestly, a big part was ‘can I hack this,’ and pure curiosity,” he continued, adding in a smiley face.

To paraphrase Mr. Astley’s witless lyrics, a full commitment to ethical behavior seems to be what Roth is thinking of here, but you’re not going to get that from just any other hacker. Others seem to have caught on to the fact the AirTags aren’t impenetrable.

“Fabian Bräunlein, a security researcher at Positive Security, found that it’s possible to broadcast arbitrary data to nearby Apple devices via the Find My protocol, as he explained in a blog post,” Vice reported. “He did that by ‘spoofing many AirTags and encoding data in which AirTag is active.’ Then he made the device upload the data as part of reporting the location of the AirTag.

“Bräunlein thinks this, in theory, could be used to turn AirTags into low-bandwidth long-range communication devices, or to get around air-gapped networks.”

“I was curious whether Find My’s Offline Finding network could be (ab)used to upload arbitrary data to the internet, from devices that are not connected to WiFi or mobile internet,” Bräunlein said. While he found the AirTags were “cryptographically well designed,” he said Apple could take steps to stop “misuse potential.”

While neither of these hacks are worrisome, unless you particularly dislike Rick Astley, they show the AirTags aren’t entirely secure — and keep in mind, hobbyist hackers don’t have a financial stake in exploiting the AirTags and are much more willing to advertise their exploits.

There’s another security issue with the AirTags, too — and it doesn’t even involve hacking.

As The Washington Post’s Geoffrey Fowler wrote in a May 5 column, the AirTags make it “frighteningly easy” to allow individuals to be stalked.

“To discourage what it calls ‘unwanted tracking,’ Apple built technology into AirTags to warn potential victims, including audible alarms and messages about suspicious AirTags that pop up on iPhones,” he wrote. “To put Apple’s personal security protections to the test, my colleague Jonathan Baran paired an AirTag with his iPhone, slipped his tag in my backpack (with my permission), and then tracked me for a week from across San Francisco Bay.”

“I got multiple alerts: from the hidden AirTag and on my iPhone. But it wasn’t hard to find ways an abusive partner could circumvent Apple’s systems. To name one: The audible alarm only rang after three days — and then it turned out to be just 15 seconds of light chirping. And another: While an iPhone alerted me that an unknown AirTag was moving with me, similar warnings aren’t available for the roughly half of Americans who use Android phones.”

Furthermore: “After placing an AirTag in my bag, my colleague was able to find my whereabouts with remarkable precision. Once he associated the AirTag with his iPhone, the tag’s location showed up in an iPhone app called Find My, included free with iPhones. (It started as a way to find lost Apple products and has now expanded to other things.)”

Fowler called the devices “a new means of inexpensive, effective stalking.”

Apple maintains the AirTags are both secure and difficult for stalkers to use.

“These are an industry-first, strong set of proactive deterrents,” Kaiann Drance, Apple’s vice president of iPhone marketing, said. “It’s a smart and tunable system, and we can continue improving the logic and timing so that we can improve the set of deterrents.”

To be fair, this actually isn’t new. Fowler noted that an AirTag competitor, Tile, provides none of the protections Apple has built in. However, AirTags are the first product of this kind manufactured by one of Silicon Valley’s biggest players — and, for stalkers who may not have even considered using a tracking device before, it could be an unpleasant introduction to a new method of digital stalking.

Yes, this could all be needless alarmism. If it isn’t, however, the AirTag could end up being a $30 Pandora’s box.

Support this site so we can continue to tell you the truth.

DONATE HERE

Stillness in the Storm Editor: Why did we post this?

The news is important to all people because it is where we come to know new things about the world, which leads to the development of more life goals that lead to life wisdom. The news also serves as a social connection tool, as we tend to relate to those who know about and believe the things we do. With the power of an open truth-seeking mind in hand, the individual can grow wise and the collective can prosper.

– Justin

Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.


Stillness in the Storm Editor’s note: Did you find a spelling error or grammatical mistake? Send an email to [email protected], with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading.

Source:

https://thefederalistpapers.org/us/hacker-cracks-apples-new-gadget-now-worried-found-inside-used-spy-us

DIRECT DONATION

Support our work! (Avoid Big Tech PayPal and Patreon)

Filed Under: News, Secret Technology Tagged With: airtag, apple, espionage, hacking, news, The Federalist Papers, video

Notices and Disclaimers

We need $2000 per month to pay our costs. Help us one time or recurring. (DONATE HERE)

To sign up for RSS updates, paste this link (https://stillnessinthestorm.com/feed/) into the search field of your preferred RSS Reader or Service (such as Feedly or gReader).

Subscribe to Stillness in the Storm Newsletter

“It is the mark of an educated mind to be able to entertain a thought without accepting it.” – Aristotle

This website is supported by readers like you.

If you find our work of value, consider making a donation. 

Stillness in the Storm DISCLAIMER: All articles, videos, statements, claims, views and opinions that appear anywhere on this site, whether stated as theories or absolute facts, are always presented by Stillness in the Storm as unverified—and should be personally fact checked and discerned by you, the reader. Any opinions or statements herein presented are not necessarily promoted, endorsed, or agreed to by Stillness, those who work with Stillness, or those who read Stillness. Any belief or conclusion gleaned from content on this site is solely the responsibility of you the reader to substantiate, fact check, and no harm comes to you or those around you. And any actions taken by those who read material on this site is solely the responsibility of the acting party. You are encouraged to think carefully and do your own research. Nothing on this site is meant to be believed without question or personal appraisal.

Content Disclaimer: All content on this site marked with “source – [enter website name and url]” is not owned by Stillness in the Storm. All content on this site that is not originally written, created, or posted as original, is owned by the original content creators, who retain exclusive jurisdiction of all intellectual property rights. Any copyrighted material on this site was shared in good faith, under fair use or creative commons. Any request to remove copyrighted material will be honored, provided proof of ownership is rendered. Send takedown requests to [email protected].

What is our mission? Why do we post what we do?

Our mission here is to curate (share) articles and information that we feel is important for the evolution of consciousness. Most of that information is written or produced by other people and organizations, which means it does not represent our views or opinions as managing staff of Stillness in the Storm. Some of the content is written by one of our writers and is clearly marked accordingly. Just because we share a CNN story that speaks badly about the President doesn’t mean we’re promoting anti-POTUS views. We’re reporting on the fact as it was reported, and that this event is important for us to know so we can better contend with the challenges of gaining freedom and prosperity. Similarly, just because we share a pro/anti-[insert issue or topic] content, such as a pro-second amendment piece or an anti-military video doesn’t mean we endorse what is said. Again, information is shared on this site for the purpose of evolving consciousness. In our opinion, consciousness evolves through the process of accumulating knowledge of the truth and contemplating that knowledge to distill wisdom and improve life by discovering and incorporating holistic values. Thus, sharing information from many different sources, with many different perspectives is the best way to maximize evolution. What’s more, the mastery of mind and discernment doesn’t occur in a vacuum, it is much like the immune system, it needs regular exposure to new things to stay healthy and strong. If you have any questions as to our mission or methods please reach out to us at [email protected].

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Search Our Archives

FUNDRAISER!

Latest Videos

Guarding Against Bio Tech and EMF - Fix The World Project | Just In Stillness

From around the web

News “they” don’t want you to see

Newsletter

You can unsubscribe anytime. For more details, review our Privacy Policy.

Thank you!

You have successfully joined our subscriber list.

.

We Need Your Support

Support our work!

Weekly Newsletter Sign UP

Only want to see emails once a week? Sign up for the Weekly Newsletter here: SIGN UP. (Make sure you send an email to [email protected] to confirm the change or it won’t work).

Latest Videos

Footer

  • Menus
  • Internship Program
  • RSS
  • Social Media
  • Media
  • Privacy Policy

Copyright © 2026 · Privacy Policy · Log in · Built by

This website wouldn't be the same without the ethical web hosting provided by Modern Masters. Modern Masters ethically serves small businesses in metaphysical, paranormal, healing, spirituality, homesteading, acupuncture and other related fields. Get the perfect website for your sacred work at Modern Masters.