China warns of AirDrop de-anonymization flaw
Briefly

Because AirDrop does not require an Internet connection to be delivered, this behavior cannot be effectively monitored through conventional network monitoring methods, which has become a major problem for the public security organs to solve such cases...
Infosec academic Matthew Green analyzed the post, and research on AirDrop published in 2019 by academics from TU Darmstadt, and concluded the protocol is leaky and the Institute's assertion that identifiable information is only hashed and accessible through a 'rainbow table' is accurate.
Read at Theregister
[
add
]
[
|
|
]