Trust In Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol

HGykten2plk/default.jpg

By using protocols like AirDrop, iMessage which falls under the umbrella of "Continuity," devices can seamlessly share messages, browser tabs, clipboards and wireless hotspots without much hassle of setting it up. However, during our daily usage of said protocols, we barely to think about privacy and security implications behind these protocols, and will be assuming that Apple protects our privacy at all times.

By Ta-Lun Yen

Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefi...

HGykten2plk/default.jpg
Trust In Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol Trust In Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol Reviewed by Anonymous on March 19, 2020 Rating: 5