Breakthrough in Apple’s AirTags: all privacy doubts dispelled, a way to use them has been found without any more problems. That’s how.

A device that has impressed, intrigued but divided since its release, during Apple’s “Spring Loaded” event dated 2021. AirTag, a device designed to help you easily find any lost object, locatable via the Dove’è app.

AirTag, the Apple device that divides in terms of privacy – Sjbeez

A device that is in some ways unique, which really solves many problems for us by thinking about a set of car or house keys, luggage at the airport, even the wallet where practically “our whole life” is inside. But those same characteristics that make them easy to implement and inconspicuous in everyday life, and what’s more at a relatively low cost (about 40 euros, more promo, less promo) have allowed them to be abused, going well beyond the discovery of an object.

Two concepts that prevent an AirTag from being used for stalking. What will Apple do?

Thus the AirTag has become a very controversial device, used by criminals for scams and domestic abuse, a total invasion of our privacy, despite Apple having done its utmost to adopt protective measures created to warn iPhone and Android users if an AirTag is found in their vicinity for a significant period of time, without the presence of the owner’s iPhone, which could indicate that one of these devices is installed to secretly track their users.

An AirTag and a thousand colors and functions – photo source – Sjbeez

Changes have been made and steps forward have also been made in this regard. But either out of fear or out of a logical culture of suspicion, many have been perplexed by a purchase which, depending on how it is used, can bring directly proportional benefits to the apple factories. Apparently, at least so far. Yes, because security researchers from John Hopkins and San Diego California universities have developed an algorithm that removes all doubts.

They claim to have developed a cryptographic scheme to solve the privacy problem, prioritizing the detection of potentially malicious AirTags, but at the same time preserving maximum privacy for users. The solution was born based on two consolidated areas of cryptography. The first element is "secret sharing," which allows the creation of systems that cannot reveal anything about the owner of an AirTag.

The second concept is "error-correcting coding," specifically designed to separate signal from noise and preserve the durability of the signals themselves, even if they acquire errors or corruptions. The ball is in Apple’s court, which will determine whether this idea can become reality and dispel doubts once and for all about these devices. It would be a really big breakthrough.