


Apple reveals nuclear bomb-level vulnerability! Abuse of location services can monitor global privacy: not even Apple can avoid it
News on May 27th: Recently, Apple’s Wi-Fi Positioning Service (WPS) was exposed to have a serious vulnerability. This vulnerability may be abused to monitor the privacy of users around the world, even non-Apple device users will not be immune.
Security researchers from the University of Maryland in the United States described in detail the design flaws of Apple's WPS in the paper "Monitoring Crowds Using Wi-Fi-Based Positioning Systems." This flaw not only affects Apple devices, but may also allow other devices to User privacy is at risk.
According to the description of the paper, WPS positioning has two main working methods: one is to calculate the client location and return these coordinates; the other is to return the geographical location of the submitted BSSID (Basic Service Set Identifier) (with the AP hardware associated) and let the client do the calculations to determine its location.
Google's WPS uses the former. The Android phone will record the BSSID it can see and its signal strength, and send the data to the Google server. The server uses the WPS database to calculate the location of the phone and sends it to cell phone.
Compared with Google's WPS, the Apple system not only returns the requested BSSID location, but also returns the locations of up to 400 nearby BSSIDs. This process requires no authentication, no rate limit, and is completely free.
Therefore, researchers found that by sending requests to Apple’s WPS API, a large amount of BSSID precise location information can be obtained, which can be used to track and monitor individuals and groups. of movement.
The research team collected location data of more than one billion BSSIDs through a month of API queries, and then mapped the movement of devices around the world.
They even used this vulnerability to track the movement of military equipment in the Russia-Ukraine conflict area, showing the seriousness of this vulnerability and the danger of practical application.
The above is the detailed content of Apple reveals nuclear bomb-level vulnerability! Abuse of location services can monitor global privacy: not even Apple can avoid it. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



DeepSeek Smart AI Tool Download and Installation Guide (Apple Users) DeepSeek is a powerful AI tool. This article will guide Apple users how to download and install it. 1. Download and install steps: Open the AppStore app store and enter "DeepSeek" in the search bar. Carefully check the application name and developer information to ensure the correct version is downloaded. Click the "Get" button on the application details page. The first download may require AppleID password verification. After the download is completed, you can open it directly. 2. Registration process: Find the login/registration portal in the DeepSeek application. It is recommended to register with a mobile phone number. Enter your mobile phone number and receive the verification code. Check the user agreement,

Why can’t the Bybit exchange link be directly downloaded and installed? Bybit is a cryptocurrency exchange that provides trading services to users. The exchange's mobile apps cannot be downloaded directly through AppStore or GooglePlay for the following reasons: 1. App Store policy restricts Apple and Google from having strict requirements on the types of applications allowed in the app store. Cryptocurrency exchange applications often do not meet these requirements because they involve financial services and require specific regulations and security standards. 2. Laws and regulations Compliance In many countries, activities related to cryptocurrency transactions are regulated or restricted. To comply with these regulations, Bybit Application can only be used through official websites or other authorized channels

It is crucial to choose a formal channel to download the app and ensure the safety of your account.

This article will guide you in detail how to access the official website of Gate.io, switch Chinese language, register or log in to your account, as well as optional mobile app download and use procedures, helping you easily get started with the Gate.io exchange. For more tutorials on using Gate.io in Chinese, please continue reading.

The official download steps of the Sesame Open Exchange app cover the Android and iOS system download process, as well as common problems solutions, helping you download safely and quickly and enable convenient transactions of cryptocurrencies.

An application that converts XML directly to PDF cannot be found because they are two fundamentally different formats. XML is used to store data, while PDF is used to display documents. To complete the transformation, you can use programming languages and libraries such as Python and ReportLab to parse XML data and generate PDF documents.

Gate.io Apple mobile phone download guide: 1. Visit the official Gate.io website; 2. Click "Use Apps"; 3. Select "App"; 4. Download the App Store; 5. Install and allow permissions; 6. Register or log in; 7. Complete KYC verification; 8. Deposit; 9. Transaction of cryptocurrency; 10. Withdrawal.

Problems and solutions encountered when compiling and installing Redis on Apple M1 chip Mac, many users may...
