Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol
Ta-Lun Yen at Black Hat Europe 2019
By using protocols like AirDrop, iMessage which falls under the umbrella of "Continuity," devices can seamlessly share messages, browser tabs, clipboards and wireless hotspots without much hassle of setting it up. However, during our daily usage of said protocols, we barely to think about privacy and security implications behind these protocols, and will be assuming that Apple protects our privacy at all times.
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/#trust-in-apples-secret-garden-exploring--reversing-apples-continuity-protocol-17829
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/#trust-in-apples-secret-garden-exploring--reversing-apples-continuity-protocol-17829