A Chinese state-backed research institute claims to have discovered a method for decrypting device logs related to Apple’s AirDrop feature, enabling the identification of individuals who shared content through the platform. China, known for its strict censorship practices, has a history of controlling access to mobile apps and encrypted messaging services. Apple’s AirDrop, initially used as a workaround for censorship during protests, became a tool for sharing information, prompting the Chinese government to enhance controls. The research institute now asserts that it can extract sender information, including phone numbers and email addresses, from AirDropped images.
The Beijing Wangshendongjian Judicial Appraisal Institute in China claims to have developed a technique to extract phone numbers, email addresses, and device names from AirDropped images’ device logs. The research was initiated after instances of “inappropriate” content being shared via AirDrop in the Beijing subway. Despite Apple’s prior measures to limit AirDrop usage, this breakthrough raises concerns about privacy and security, with Chinese authorities stating they have already utilized this forensic capability to identify suspects involved in cases related to AirDrop usage.
This revelation accentuates the ongoing tension between user privacy and government surveillance in China, as the state adapts to technological advancements for monitoring and controlling information dissemination. The ability to decrypt AirDrop logs raises questions about the security of Apple’s features in regions where censorship and surveillance are prevalent, highlighting the evolving landscape of digital rights and the challenges faced by tech companies in balancing global user expectations with local regulatory demands. It also underscores the broader implications of technology being exploited for surveillance and control in the context of civil liberties and individual privacy.