Now Tec BlogNow Tec Blog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Science Behind Sneezing | PBS North Carolina

    March 31, 2023

    Toxic Chemicals and Russian Cyberwar Tactics

    March 31, 2023

    Las Vegas Lawyer Indicted in $460 Million Ponzi Scheme

    March 31, 2023
    Facebook Twitter Instagram
    • Home
    • Business

      Las Vegas Lawyer Indicted in $460 Million Ponzi Scheme

      March 31, 2023

      Cruise’s CFO has big plans for self-driving cars

      March 31, 2023

      how long can a person live

      March 31, 2023

      Judge’s Rules for ACA’s Preventive Care Requirements

      March 31, 2023

      Rolls-Royce replaces finance director, new chief shakes top team

      March 31, 2023
    • Gadgets

      What is the difference between SpaceX’s Starlink and OneWeb?

      March 31, 2023

      The Morning After: Midjourney Terminates AI Image Generator Free Trial Due To ‘Extraordinary’ Abuse

      March 31, 2023

      Amazon’s World Backup Day sale offers up to 67% off SSDs, memory and more

      March 31, 2023

      Netflix hopes the movies will be better by reducing the number of original movies

      March 31, 2023

      Virgin Orbit officially ends space launch business

      March 30, 2023
    • Tech

      Toxic Chemicals and Russian Cyberwar Tactics

      March 31, 2023

      Dungeons & Dragons: Honor Among Thieves Plays Like the Best D&D Games

      March 31, 2023

      We breathe, eat and drink toxic chemicals. Now we need to understand how they affect us.

      March 31, 2023

      How do people live in orbit? Ask a space archaeologist

      March 31, 2023

      Paris fell in love with an escooter.now it may ban them

      March 31, 2023
    • World

      What is indictment?Everything You Need To Know About The Donald Trump Case | Donald Trump News

      March 31, 2023

      Crew missing after Gulf of Guinea pirate attack | Crime News

      March 31, 2023

      Alarm after Taliban arrest girls’ school activist amid crackdown | Taliban News

      March 31, 2023

      How an interview with a rapist inspired Serbian feminists | Women’s Rights

      March 31, 2023

      Israel conducts airstrikes near Damascus: Syrian state media | News

      March 31, 2023
    • AI

      Is C3.ai the top AI stock to buy?

      March 31, 2023

      AI Leaders Call For Pause, More AI Stories Coming March 2023

      March 31, 2023

      Read’s AI-powered summaries narrow meetings down to 2-minute clips

      March 31, 2023

      This bullish government says we don’t have to fear AI. are you still scared? | | Gaby Hinsliff

      March 31, 2023

      Congressional education, regulation of AI capabilities could be ‘heavy lifting’: US Senator

      March 31, 2023
    • Apple

      Apple’s AR/VR Headset: What to Expect in 2023

      March 31, 2023

      Oh Again; Wall Street Analyst Touts Disney Acquisition by Apple

      March 30, 2023

      $736 Off Apple MacBook Pro

      March 30, 2023

      Be careful when searching for customer care numbers on Google. This is a new scam.

      March 30, 2023

      Apple Pay Later finally rolls out to a select few users in 45 US states

      March 28, 2023
    • ChatGPT

      Wondershare Filmora 12 Integrated ChatGPT Offers Swift Script Functionality With AI Copywriting

      March 31, 2023

      Italian privacy regulator bans ChatGPT – POLITICO

      March 31, 2023

      Stopping ChatGPT development is a ‘bad idea’: Coinbase CEO

      March 31, 2023

      ChatGPT comes to life by turning Uncle Rabbit, voice-to-text on WhatsApp, prompts into rap rhymes: trending AI tools

      March 31, 2023

      Who are ChatGPT’s competitors?

      March 31, 2023
    • Cyber Security

      Cyber ​​Security Today, March 31, 2023 – World Backup Day Advice, New Malware Targeting Linux, and More

      March 31, 2023

      Cyber ​​Secure Physical Security High End User Attention

      March 31, 2023

      This fall cybersecurity conference will help keep businesses safe

      March 31, 2023

      CERT-in may be exempt from the RTI Act: Govt.

      March 31, 2023

      Cybersecurity Skills Shortage: How Focusing on DEI Can Help

      March 31, 2023
    • Computing

      Featuring SenseTime, Xpeng, Geely, Tesla and more

      March 31, 2023

      Wearable Computing Devices Market to receive overwhelming revenue growth boosting overall industry growth:

      March 31, 2023

      Short-term memory capacity analysis of Lu3Fe4Co0.5Si0.5O12-based spin cluster glass towards reservoir computing

      March 31, 2023

      Edge Computing Market Size Equivalent to US Dollar at CAGR 36.3%

      March 31, 2023

      Singapore-based software startup Horizon Quantum Computing raises $18.1M

      March 31, 2023
    • Science

      The Science Behind Sneezing | PBS North Carolina

      March 31, 2023

      Scientists accidentally discovered that photosynthesis doesn’t work the way we thought

      March 31, 2023

      What Science Shows About California’s Record Snowfall

      March 31, 2023

      Astronomers may finally have discovered source of mysterious fast radio burst: report

      March 31, 2023

      3 common anti-trans myths debunked by science

      March 31, 2023
    Facebook Twitter Instagram
    Now Tec BlogNow Tec Blog
    • Home
    • Business

      Las Vegas Lawyer Indicted in $460 Million Ponzi Scheme

      March 31, 2023

      Cruise’s CFO has big plans for self-driving cars

      March 31, 2023

      how long can a person live

      March 31, 2023

      Judge’s Rules for ACA’s Preventive Care Requirements

      March 31, 2023

      Rolls-Royce replaces finance director, new chief shakes top team

      March 31, 2023
    • Gadgets

      What is the difference between SpaceX’s Starlink and OneWeb?

      March 31, 2023

      The Morning After: Midjourney Terminates AI Image Generator Free Trial Due To ‘Extraordinary’ Abuse

      March 31, 2023

      Amazon’s World Backup Day sale offers up to 67% off SSDs, memory and more

      March 31, 2023

      Netflix hopes the movies will be better by reducing the number of original movies

      March 31, 2023

      Virgin Orbit officially ends space launch business

      March 30, 2023
    • Tech

      Toxic Chemicals and Russian Cyberwar Tactics

      March 31, 2023

      Dungeons & Dragons: Honor Among Thieves Plays Like the Best D&D Games

      March 31, 2023

      We breathe, eat and drink toxic chemicals. Now we need to understand how they affect us.

      March 31, 2023

      How do people live in orbit? Ask a space archaeologist

      March 31, 2023

      Paris fell in love with an escooter.now it may ban them

      March 31, 2023
    • World

      What is indictment?Everything You Need To Know About The Donald Trump Case | Donald Trump News

      March 31, 2023

      Crew missing after Gulf of Guinea pirate attack | Crime News

      March 31, 2023

      Alarm after Taliban arrest girls’ school activist amid crackdown | Taliban News

      March 31, 2023

      How an interview with a rapist inspired Serbian feminists | Women’s Rights

      March 31, 2023

      Israel conducts airstrikes near Damascus: Syrian state media | News

      March 31, 2023
    • AI

      Is C3.ai the top AI stock to buy?

      March 31, 2023

      AI Leaders Call For Pause, More AI Stories Coming March 2023

      March 31, 2023

      Read’s AI-powered summaries narrow meetings down to 2-minute clips

      March 31, 2023

      This bullish government says we don’t have to fear AI. are you still scared? | | Gaby Hinsliff

      March 31, 2023

      Congressional education, regulation of AI capabilities could be ‘heavy lifting’: US Senator

      March 31, 2023
    • Apple

      Apple’s AR/VR Headset: What to Expect in 2023

      March 31, 2023

      Oh Again; Wall Street Analyst Touts Disney Acquisition by Apple

      March 30, 2023

      $736 Off Apple MacBook Pro

      March 30, 2023

      Be careful when searching for customer care numbers on Google. This is a new scam.

      March 30, 2023

      Apple Pay Later finally rolls out to a select few users in 45 US states

      March 28, 2023
    • ChatGPT

      Wondershare Filmora 12 Integrated ChatGPT Offers Swift Script Functionality With AI Copywriting

      March 31, 2023

      Italian privacy regulator bans ChatGPT – POLITICO

      March 31, 2023

      Stopping ChatGPT development is a ‘bad idea’: Coinbase CEO

      March 31, 2023

      ChatGPT comes to life by turning Uncle Rabbit, voice-to-text on WhatsApp, prompts into rap rhymes: trending AI tools

      March 31, 2023

      Who are ChatGPT’s competitors?

      March 31, 2023
    • Cyber Security

      Cyber ​​Security Today, March 31, 2023 – World Backup Day Advice, New Malware Targeting Linux, and More

      March 31, 2023

      Cyber ​​Secure Physical Security High End User Attention

      March 31, 2023

      This fall cybersecurity conference will help keep businesses safe

      March 31, 2023

      CERT-in may be exempt from the RTI Act: Govt.

      March 31, 2023

      Cybersecurity Skills Shortage: How Focusing on DEI Can Help

      March 31, 2023
    • Computing

      Featuring SenseTime, Xpeng, Geely, Tesla and more

      March 31, 2023

      Wearable Computing Devices Market to receive overwhelming revenue growth boosting overall industry growth:

      March 31, 2023

      Short-term memory capacity analysis of Lu3Fe4Co0.5Si0.5O12-based spin cluster glass towards reservoir computing

      March 31, 2023

      Edge Computing Market Size Equivalent to US Dollar at CAGR 36.3%

      March 31, 2023

      Singapore-based software startup Horizon Quantum Computing raises $18.1M

      March 31, 2023
    • Science

      The Science Behind Sneezing | PBS North Carolina

      March 31, 2023

      Scientists accidentally discovered that photosynthesis doesn’t work the way we thought

      March 31, 2023

      What Science Shows About California’s Record Snowfall

      March 31, 2023

      Astronomers may finally have discovered source of mysterious fast radio burst: report

      March 31, 2023

      3 common anti-trans myths debunked by science

      March 31, 2023
    Now Tec BlogNow Tec Blog
    Home»Tech News»AirDrop leaks email addresses and phone numbers
    Tech News

    AirDrop leaks email addresses and phone numbers

    eduardo_alves38By eduardo_alves38April 27, 2021Updated:April 27, 2021No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    AirDrop, the functionality this allows Mac and iPhone users transfer files wirelessly between devices, users’ emails and phone numbers are leaking, and there’s little no one can do to stop it except turn it off, the people said. researchers.

    Ars Technica

    This story originally appeared on Ars Technica, a trusted source for technology news, technology policy analysis, reviews, and more. Ars is owned by WIRED’s parent company, Condé Nast.

    AirDrop uses Wi-Fi and Bluetooth Low Energy to make direct connections with nearby devices so they can transmit pictures, documents and other things from a single ios or macOS device to another. One mode only allows contacts to connect, a second allows anyone to connect, and the last allows no connection.

    To determine if a potential sender’s device should connect to other nearby devices, AirDrop broadcasts Bluetooth Ads containing a partial cryptographic hash of the sender’s phone number and email address. If any of the truncated hashes matches a phone number or email address in the receiving device’s address book, or if the device is configured to receive from everyone, both devices will engage. in a mutual authentication handshake over Wi-Fi. During the handshake, devices exchange complete SHA-256 hashes of owners’ phone numbers and email addresses.

    Hashes, of course, cannot be converted back into the clear text that generated them, but depending on the amount of entropy or randomness of the clear text, it is often possible to understand them. Hackers do this by performing a “brute force attack”, which throws a large number of guesses and waits for the one that generates the sought hash. The less entropy in the clear text, the easier it is to guess or crack, as there are fewer possible candidates for an attacker to try.

    The amount of entropy in a phone number is so minimal that this cracking process is trivial as it takes milliseconds to search for a hash in a precomputed database containing the results of all possible phone numbers in the world. While many email addresses have more entropy, they can also be hacked using the billions of email addresses that have appeared in database breaches over the past 20 years.

    “This is an important discovery because it allows attackers to gain some rather personal information from Apple users which can then be misused for spear phishing attacks, scams, etc. or simply be sold, ”said Christian Weinert, one of the researchers. at the German Technical University in Darmstadt which found the vulnerabilities. “Who doesn’t want to send a message directly to, say, Donald Trump on WhatsApp? All attackers need is a Wi-Fi enabled device near their victim.”

    In one paper presented in August at the USENIX Security Symposium, Weinert and researchers from the SEEMOO lab at TU Darmstadt devised two ways to exploit vulnerabilities.

    The simplest and most powerful method is for an attacker to simply watch for discovery requests sent by other nearby devices. Since the sender’s device always discloses its own hashed phone number and email address whenever it scans for available AirDrop receivers, the attacker only has to wait for nearby Macs to open. the share menu or nearby iOS devices to open the share sheet. The attacker does not need to have the target’s phone number, email address, or other prior knowledge.

    A second method works largely in reverse. An attacker can open a share menu or share sheet and see if nearby devices respond with their own hashed details. This technique is not as powerful as the first one because it only works if the attacker’s phone number or email address is already in the recipient’s address book.

    Nevertheless, the attack can be useful when the attacker is someone whose phone number or email address is well known to many people. A manager, for example, could use it to get the phone number or email address of any employee whose manager contact information is stored in their address books.

    In an email, Weinert wrote:

    What we call “sender leak” (that is, someone who intends to share a file loses their hashed contact credentials) could be exploited by planting “bugs” (small Wi-Fi enabled devices) at public hotspots or other places of interest.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    eduardo_alves38
    • Website

    Related Posts

    Toxic Chemicals and Russian Cyberwar Tactics

    March 31, 2023

    Dungeons & Dragons: Honor Among Thieves Plays Like the Best D&D Games

    March 31, 2023

    We breathe, eat and drink toxic chemicals. Now we need to understand how they affect us.

    March 31, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    Wondershare Filmora 12 Integrated ChatGPT Offers Swift Script Functionality With AI Copywriting

    March 31, 2023

    Italian privacy regulator bans ChatGPT – POLITICO

    March 31, 2023

    Stopping ChatGPT development is a ‘bad idea’: Coinbase CEO

    March 31, 2023

    ChatGPT comes to life by turning Uncle Rabbit, voice-to-text on WhatsApp, prompts into rap rhymes: trending AI tools

    March 31, 2023
    Top Reviews
    Advertisement
    Demo
    Now Tec Blog
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • About us
    • DMCA
    • Privacy Policy
    © 2023 nowtecblog. Designed by nowtecblog.

    Type above and press Enter to search. Press Esc to cancel.