From 036b99c2bd3b047c2251821d3ae47b237f828014 Mon Sep 17 00:00:00 2001 From: Milan Stute Date: Mon, 8 Mar 2021 09:31:29 +0100 Subject: [PATCH] Add press coverage to README --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index ee37c89..dfcae78 100644 --- a/README.md +++ b/README.md @@ -33,6 +33,7 @@ By using the app, you can track your micro:bit tag anywhere on earth without cel OpenHaystack is the result of reverse-engineering and security analysis work of Apple's _Find My network_ (or _offline finding_). We at the [Secure Mobile Networking Lab](https://seemoo.de) of TU Darmstadt started analyzing offline finding after its initial announcement in June 2019. We identified how Apple devices can be found by iPhones devices, even when they are offline through this work. The whole system is a clever combination of Bluetooth advertisements, public-key cryptography, and a central database of encrypted location reports. We disclosed a specification of the closed parts of offline finding and conducted a comprehensive security and privacy analysis. We found two distinct vulnerabilities. The most severe one, which allowed a malicious application to access location data, has meanwhile been fixed by Apple ([CVE-2020-9986](https://support.apple.com/en-us/HT211849)). For more information about the security analysis, please read [our paper](#references). +Since its release, we received quite a bit of [press and media coverage](https://owlink.org/press/). ### Disclaimer