Apple’s AirDrop
China’s state-back Beijing Institute announced that it has been using iPhone logs to identify users sending and receiving content over AirDrop. While it did not detail the process, security researchers are saying both that AirDrop is insecure, and that Apple has been repeatedly told of problems.
The claim that sender details can be found in device logs is confirmed by MacWorld, although testers were only able to uncover the name of a sending iPhone, and Bluetooth signal strength by accessing the console log on a Mac that received a file over AirDrop. The name and signal strength were stored in an AirDrop subprocess that was part of the overall “sharingd” process.