Sending Data over Offline Finding Networks

Researchers turn lost-device pings into a secret data lane

TLDR: Researchers proved you can send one-way messages via Apple’s lost-device network, hitching rides on nearby phones without internet. Commenters are split between IoT enthusiasm and stalking fears, with extra snark that Google’s version lags and big questions about whether this should exist at all.

The internet is losing it over a wild demo: two researchers showed you can sneak one‑way, secure messages through the same “where’s my stuff?” network that helps find lost iPhones and AirTags. Think piggybacking on billions of nearby phones to deliver tiny data bursts—no Wi‑Fi, no SIM. Apple’s Find My shines; Google’s similar system? Not so much, according to readers. And the crowd is split. The builders and tinkerers are hyped, calling it a free backup for smart gadgets. The privacy crowd hears one thing: stalker vibes.

The hottest arguments swirl around Apple’s anti‑stalking alerts—one commenter calmly drops that alerts only trigger after “at least 840 meters and 10 mins,” sparking panic‑bus jokes about everyone’s phones screaming at once. Fans gush about using this as a LoRa‑style backup for IoT gadgets, while skeptics ask the party‑pooper question: cool hack, but why? Another spicy thread claims you don’t even need sneaky tricks to dodge warnings, fanning the ethics flame. Google’s network catches strays too, with side‑eye that it “didn’t work in a non‑awful way.” Bottom line: half the comments are building a DIY spy movie, the other half wants stricter rules before the sequel. It’s classic internet drama—equal parts ingenuity, anxiety, and meme‑fuel, and everyone’s yelling into the same Bluetooth void.

Key Points

  • The project demonstrates arbitrary, secure, unidirectional data transmission using Offline Finding networks.
  • Apple’s Find My uses ECC-generated keys; public and symmetric keys are stored on-device, full key sets in iCloud Keychain.
  • Lost devices broadcast rolling public keys via BLE; the 28-byte key plus metadata requires encoding part of the key in the MAC address.
  • Finder devices upload encrypted location reports (including lat/long/status) and a SHA-256 hash of the seen key to Apple’s servers.
  • Users query Apple’s servers by computed rolling key hashes via HTTPS, with up to 256 keys per request and up to 20 reports per key.

Hottest takes

“for at least 840 meters and 10 mins.” — andyjohnson0
“piggy-backing Apples network to extend IoT seems like a reachable fruit ..” — MomsAVoxell
“Slightly disappointing that you don't even need to resort to that.” — IshKebab
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.