The real skill show here is not your hardware hacking (which is REALLY cool). The real skill here is the way you can simplify everything enough for most people to understand without sacrificing details for the ones that can appreciate it. THIS is how you get more people into a field. Keep sharing and encouraging people to follow up on their curiosities to find out how stuff work!
I mean, they did all the hard work, and basically wrote a guide on what you need to do. So I'd venture many people could repeat this at home if they work on their soldering skills a bit!
I'm not involved much in hacking but that skip of the debug check with the voltage is mindblowing to me. Didn't know this was possible, and didn't know that people implement a debug mode like that in such chips.
This is basically a case of "security by obscurity". Nordic Semiconductor (nRF) engineers would say: "we never expected anyone to do that...". They could probably protect the next generation of chips by having some internal capacitance to make it harder to glitch externally.
I mean, your airtags are safe unless someone physically gets their hands on it, breaks it open, solders wires to it, etc. The airtag is still safe from remote hacking
Unless you don't own an Apple device with which to use their warning thing. Then they're a stalker's wet dream, and frankly criminally negligent to release.
@@keiyakins I’ve done some quick reading and it seems you’re right, the current firmware leaves a fair bit to be desired. Hopefully they fix this. It’s worth noting that I can buy a 4G-enabled chip that could do something similar with zero restrictions for not a lot of money from aliexpress.
I am continually blown away by your videos, how you lay everything out so clearly, and the skill with which you do all that you do. I strive to be able to do things like this. Great work, man!
@@esotericsean @James Reaction @ stacksmashing Wow.I am seeing one great youtuber loving videos of an awesome youtuber who is blown away by other mind blowingyoutuber. You three are awesome.You are providing amazing content.Love you three.
That's because the justice system in USA is so messed up that you have to include silly disclaimers and warnings on everything. The rest of the world developed in a different direction. If you screw up, it's your own fault and and can't sue anyone for it. The best thing you can do is to look in the mirror. In America though... oh it got pretty wild and that's why the "don't try this at home" slogan even exists.
I know exactly what you mean. Let me tell you why you're here. You're here because you know something. What you know you can't explain, but you feel it. You've felt it your entire life. That there's something wrong with the world, you don't know what it is, but it's there. Like a splinter in your mind, driving you mad. It is this feeling that has brought you to me. Do you know what I'm talking about?
Let’s you know what can be done and how they do it. Your iPhone security if they have direct access they can use these techniques to find what on the phone although would take much longer to do and probably are other better ways in but just another tool in the tool box
@@Adaephonable Yes but if you place one of this airtags at an airport or so you can get a lot of phones and this can add up. One phone isn't gread but 1000 or 10,000...
I'm a computer engineering student and I'd love to get better at understanding hardware hacking. Your explanation of "glitching" was really good. Is there any resources or other videos I could check out to learn more about hardware hacking like this?
There's also a bunch of good stuff in whatever-number-C3 talks. Notably ones revealing some new flaw found in some game console to allow homebrew often contain some serious hardware hacking talk. "Nintendo Hacking 2016" and "Console Hacking 2016" come to mind, and tend to be a mix of super low level hardware hackery such as MITMing a PCIe bus or using external hardware to dump RAM chips of a live system, and software analysis.
@@joemck85 I remember seeing one of those talks in hackaday a while back, but never thought about the nC3 thing, until now that I didn't understand the reference and had to look for, simple details silly me 😆
Nice work! I tend to avoid all products designed in Cupertino because they tend to only function with other products designed in Cupertino, but now it might be worthwhile thanks to you!
There is a thing called brown out reset. You can check for that flag during the debug lock procedure. If the flag is risen at all :) Great video and a presentation, thank you!
I occasionally read through the "discovery" page on my phone (that page on android shows me targeted news) and yesterday while pooping I read the title "somebody has already hacked apples airtags"...should have known it'd be you.
You explained the concept so elegantly that it made me realize the RGH (Reset Glitch Hack) hack for the Xbox 360 used a very similar methodology to achieve code execution.
Very good work! I wonder about what the apple IC is doing in there, considering the NRF is already an onboard microcontroller and it doesn’t exactly need tons of processing power.
UWB - Ultra WideBand radio. I won't explain what it is and how it works, but the AirTag and compatible devices use UWB radio to measure how long it takes radio signals to travel between the devices - i.e. "Time Of Flight (TOF)". This allows the devices to measure the distance between themselves.
Im not a hacker but keep doing what you do man, people like you in the end do magic to the world of tech! Also even i understood the video, you are a born teacher!
So, if it‘s possible to change firmware of an Airtag, it would be possible to use it as an Ultrawideband controller for an RPI Pico or ESP32. The goal is to have the „find“ and „distance“ functions not only accessable from iPhones. It could be usable from microcontrollers too. That would be a nice project...
@@gamechep, Nintendo got TH-cam to take it down. Nintendo generally don't want people hacking their hardware and will gladly harass, lodge DMCA requests for the mildest of reasons.. In this case, the Game & Watch hacks were a full dissection of the device, at a software and hardware level, greatly extending the device's potential and use.
So realistically you could give someone a hacked airtag and have them install a compromised app that talks to the airtag and use the accelerometer as a microphone? How much memory is there on an airtag? I mean how long could the airtag record before it would need to talk to a phone to upload the recording. You could have airtags recording and acting as bugs and only download the content when the memory is full.
Great Video! I especially love how pretty much all of your recent hardware hacking videos can theoretically be replicated if you just have a Raspberry Pi Pico, some level shifters, and a breadboard. I haven't tried any of it yet (and to be frank I don't understand too much about low-level electronics, my understanding more or less starts at logic gates), but the fact that it doesn't need super fancy equipment makes it so much more accessible!
Haha thank you! It's funny, cause at first I was like "Why do we need Pico", and now I love it. And I think it's important to show that you don't need the highest-end devices to do cool things!
Very nice! I'd love to see someone build a "jig" that you can just place the airtag into to jailbreak the device without having to solder to the pads, like a modchip. Also is that an external antenna port I see on the PCB?
To be fair, I understand nothing in this video, however this guy is very very invested in it, and it really shines through to the point where I actually don't mind watching it..
The anti stalking feature has the side effect of making it useless for what I'd actually want to do : track my car or backpack in case it is stolen without alerting the thief that they are being tracked. The anti-stalking feature also makes it impractical to so one of these into your child's clothes to be able to track them in case they are ever kidnapped. Anyone who is riding with the child would essentially be notified that there is a tracking device. I wonder if maybe there would be a way to get the device to present itself as a different device periodically so as to throw off the anti-stalking detection of the phones.
Hey @stacksmashing! Very nice video. I'm actually trying to reproduce your glitch on another device that has an nRF52832 for a master's thesis. Now I'm wondering: How did you identify the external decoupling capacitor (and its test point) on the airtags? Would you have a keyword for me for follow up research?
Mostly you can find the pin connected to the capacitor in the datasheet. They will call it core-vcc for example. (I did not check how it is written in the nrf datasheet). Ps. I just read that you comment is one year old. I hope you could found it out on time ;-)
It's easier / cheaper to make a single version than a development version and various locked down versions for each chip. These development features are useful, and it may be desirable to use the same chip for development and production instead of just hoping they work the same.
it IS disabled. however he manages to disrupt the CPU so it executes a dead if-branch. Of course this most likely needs to be timed down to the microseconds
Removing all the debug features in the hardware and software might introduce more bugs - so then how do you debug the device if you as the developer are locked out of all of your diagnostic tools? It's simply a bad idea to make significant changes to the device between development and production. There needs to either be a developer backdoor or kill switch so that you can essentially test on the same device that you intend to sell.
What's fascinating is that now that you have the firmware dump and verified that the AirTag allows for unauthenticated firmware writes, you could theoretically overwrite any arbitrary AirTag with custom firmware for nefarious means. Disassembling and reassembling an AirTag would not show any obvious signs of tampering, so you could totally perform an evil maid style attack on one and the mark would be none the wiser.
Hey, can you make software to turn an action camera to a dash cam. Like make it start recording when turned on and stop recording when turned on. Also make it delete old footage while recording new footage. Thanks
As someone who've designed multiple PCB, I must say I'm impressed with the voltage glitching technique. I've never heard of that and I wouldn't have thought of this to make the ucontroller jump instructions. Great video!
This is pretty cool. I didn't even know Apple Airtags were a thing. But i think it's pretty neat you were able to hack them and i can imagine you can have a lot of fun with these. I wonder if you can write a program to wirelessly program them now.
Will this make the AirTags unsafe from now on? I mean someone could dump the firmware and modify it so a nearby device won't tell potential victims of the location of the airtag (Apple claims that these can't be hidden and used to track people so this could open that.... Right?)
How does this voltage fault injection really work ? I mean to skip instructions the Instruction pointer register must be incremented significantly to skip the debug routine. But after we cut the power we basically disallow the IP to increment at all, so what gives ?????
Hey...I am trying to learn this subject right now and i was wondering if you have any recommended learning resources that i could follow. thank you so much!!❤️
Next thing to do: Get the AirTag to RickRoll you via its speaker.
Yesss Please
That would be a very nice joke
This just won the internet!
Exactly my thoughts after watching this video.
Or have it open the rickroll youtube url via nfc
The real skill show here is not your hardware hacking (which is REALLY cool).
The real skill here is the way you can simplify everything enough for most people to understand without sacrificing details for the ones that can appreciate it.
THIS is how you get more people into a field.
Keep sharing and encouraging people to follow up on their curiosities to find out how stuff work!
Thank you so much :)
“Be careful when you try this at home” because I understand all of this technical stuff completely... haha. Great video.
@@francoisdang Just reported his post for 'Unwanted commercial content or spam'. Post gone (for me at least)! 😄
@@gh8447 Can confirm whatever you reported is indeed gone 🙃
I mean, they did all the hard work, and basically wrote a guide on what you need to do. So I'd venture many people could repeat this at home if they work on their soldering skills a bit!
I will definitely be trying this.
A little searching and you too can understand all the content in the video.
@@gh8447 which comment? What was it about?
I'm not involved much in hacking but that skip of the debug check with the voltage is mindblowing to me. Didn't know this was possible, and didn't know that people implement a debug mode like that in such chips.
Have a look at security testing if hardware under the Common Criteria
Very common in embedded devices, wanna see more of this voltage glitching action, search for "How I hacked a trezor wallet worth $2 million.
It would be hilarious for you to go back into the Apple store and tell them your AirTags aren’t working only for them to get Rick rolled!
This is how you get kicked out.
good idea
@@spectraljake9056 That would be an honour. I've never set foot inside an Apple store, getting kicked out my first time would be the best
@@spectraljake9056 Would that be a permanent kicking out? Or just to leave for the day?
@@colt5189 they can’t force you to give them your name. They can probably take pictures of you though.
I don't understand anything but I watched every second and nodded my head like it made sense
Because of the German accent? XD
@@centinstudios no, I dont understand circuitry at all
same here bro
Annnnd that was me as well…
This is basically a case of "security by obscurity". Nordic Semiconductor (nRF) engineers would say: "we never expected anyone to do that...". They could probably protect the next generation of chips by having some internal capacitance to make it harder to glitch externally.
Apple: "The AirTags are totally safe."
Stacksmashing: _"Hold my Raspberry Pico."_
Right? He's like "normally you would use an FPGA" and throws a Raspberry Pi Pico at it.
I mean, your airtags are safe unless someone physically gets their hands on it, breaks it open, solders wires to it, etc. The airtag is still safe from remote hacking
@@kylemwalker yes, this is way outside the threat model. Air tags are still safe in the sense Apple meant :)
Unless you don't own an Apple device with which to use their warning thing. Then they're a stalker's wet dream, and frankly criminally negligent to release.
@@keiyakins I’ve done some quick reading and it seems you’re right, the current firmware leaves a fair bit to be desired. Hopefully they fix this. It’s worth noting that I can buy a 4G-enabled chip that could do something similar with zero restrictions for not a lot of money from aliexpress.
You're like the NileRed of hardware hackers, I'm almost done with my 2 year degree in Cybersecurity and this video is teaching me a lot.
Now that's a compliment! Thanks! Glad you enjoyed it!
I am continually blown away by your videos, how you lay everything out so clearly, and the skill with which you do all that you do. I strive to be able to do things like this. Great work, man!
Thank you so much! I'm glad you enjoyed it :)
Hah, funny seeing you here! Love this guy's videos too :)
@@esotericsean hey Sean do you not create videos anymore on TH-cam? Loved some of your original vids.
@@CMAC86 I plan on returning soon! Just had some big (really good) life changes this past year :)
@@esotericsean @James Reaction @ stacksmashing
Wow.I am seeing one great youtuber loving videos of an awesome youtuber who is blown away by other mind blowingyoutuber. You three are awesome.You are providing amazing content.Love you three.
5:01
Other channels: Don't try this at home!
Stacksmashing: Be careful if you try this at home.
That's because the justice system in USA is so messed up that you have to include silly disclaimers and warnings on everything. The rest of the world developed in a different direction. If you screw up, it's your own fault and and can't sue anyone for it. The best thing you can do is to look in the mirror. In America though... oh it got pretty wild and that's why the "don't try this at home" slogan even exists.
Every new video of yours potentially extends lifespan of these devices by a lot. Your research is ground breaking every time!
I'm actually pretty surprised that I understood most of this, I've got very limited hardware / low-level experience. Awesome video!
All the way through this video I was thinking "This is cool, but what's the use?" 8:03 answered that question beautifully :D
I think it's a little obvious you can spy on someone and not get their information .... hahaha
Still no clue.
Iphone users will buy anything.
@@TheDanm22 nah, you just believe they will.
@@RadDadisRad you are 10ply.
I don't even know why I'm watching..... But I am.. 😅
maybe to react to it😂
I know exactly what you mean. Let me tell you why you're here. You're here because you know something. What you know you can't explain, but you feel it. You've felt it your entire life. That there's something wrong with the world, you don't know what it is, but it's there. Like a splinter in your mind, driving you mad. It is this feeling that has brought you to me. Do you know what I'm talking about?
Kinda weird how people automatically like a comment from a verified person without having a single reason to
Let’s you know what can be done and how they do it. Your iPhone security if they have direct access they can use these techniques to find what on the phone although would take much longer to do and probably are other better ways in but just another tool in the tool box
@@__Pre or they genuinely like and agree with the comment? 😑
Concise, informative and entertaining...what more can we ask?
Saw your tweet and was impressed, watched your video and I'm in awe. Good job, man!
Never considered doing this myself, but just the _idea_ that this works is both extremely entertaining and rather educational 😄
Love the brute force loop - automating the grind out of the fun, smashed it.
Bitcoin Mining on AirTags incoming
This is the way
@@inkybz but not my phone please
@@inkybz Yet another reason I like that Android gives you the option to turn off NFC.
@@inkybz botnet sure, mining cluster would be useless. Phones are a terrible choice for miners.
@@Adaephonable Yes but if you place one of this airtags at an airport or so you can get a lot of phones and this can add up. One phone isn't gread but 1000 or 10,000...
I'm a computer engineering student and I'd love to get better at understanding hardware hacking. Your explanation of "glitching" was really good. Is there any resources or other videos I could check out to learn more about hardware hacking like this?
Look at the sites this guy reccomends.
Do the same for them. Eventually you have a bank of experts you can trust and learn from.
There's also a bunch of good stuff in whatever-number-C3 talks. Notably ones revealing some new flaw found in some game console to allow homebrew often contain some serious hardware hacking talk. "Nintendo Hacking 2016" and "Console Hacking 2016" come to mind, and tend to be a mix of super low level hardware hackery such as MITMing a PCIe bus or using external hardware to dump RAM chips of a live system, and software analysis.
@@joemck85 I remember seeing one of those talks in hackaday a while back, but never thought about the nC3 thing, until now that I didn't understand the reference and had to look for, simple details silly me 😆
In Apple headquarters: *nervous sweating*
Cant wait to apple to make a v2 wich is glued down
Learned more about reverse engineering than any of my classes, thanks!
Nice work! I tend to avoid all products designed in Cupertino because they tend to only function with other products designed in Cupertino, but now it might be worthwhile thanks to you!
There is a thing called brown out reset. You can check for that flag during the debug lock procedure. If the flag is risen at all :) Great video and a presentation, thank you!
You got featured at "TechLinked" in the "If you cant buy a graphics card" episode at around 4:20 ... noice.
Ohh cool, thanks for letting me know! :)
@@stacksmashing yeahhh Techlinked got me here
Just wait til they start filling the casing with resin now.
I just saw Hak5 coverage for this and was looking for the video! Great timing and good job.
Things like these are why I'm studying electronics. Great work man!
Studying Electronics is supper fun.
I occasionally read through the "discovery" page on my phone (that page on android shows me targeted news) and yesterday while pooping I read the title "somebody has already hacked apples airtags"...should have known it'd be you.
I did it ages before you but don’t show or accept praise
You explained the concept so elegantly that it made me realize the RGH (Reset Glitch Hack) hack for the Xbox 360 used a very similar methodology to achieve code execution.
Well that took like a week. Very cool.
Very good work! I wonder about what the apple IC is doing in there, considering the NRF is already an onboard microcontroller and it doesn’t exactly need tons of processing power.
UWB - Ultra WideBand radio. I won't explain what it is and how it works, but the AirTag and compatible devices use UWB radio to measure how long it takes radio signals to travel between the devices - i.e. "Time Of Flight (TOF)". This allows the devices to measure the distance between themselves.
I read an article on Ars technica about this and couldn’t wait for the video.
I have no idea what Airtag is, i have no idea what you were talking about, but i watched the whole video from start to finish and it was mesmerizing!
Now all that is left to do is amplify the nfc so you can rickroll everyone in your surroundings
what kind of VILE, UNSPEAKABLE EVIL CREATED YOU, MONSTER?
Is that even possible? lol
@@WalterMan yeah i'd like to know too
@@kenopyowo probably not, probably wouldnt be legal either. Too much of a nuisance
@@WalterMan absolutely not, NFC is powered/initiated by your phone not the device itself
Due to the TH-cam algorithm I found your channel and am I sure glad I found your channel. The stuff you do is just so interesting
I'm too
You never give up, and you never let me down.
"So be careful when you do this at home"
I'm not even rich enough to get a TAXI to a Apple store
underrated
Fantastic job dude ! Too much experience went into this short explanation
Im not a hacker but keep doing what you do man, people like you in the end do magic to the world of tech! Also even i understood the video, you are a born teacher!
Definitely looking forward to getting one of those pico based tools. You are awesome! Thanks for sharing all of this with us!
Did I understand what you did: No
Did I enjoyed the video: Yes
Can’t wait to play doom on an airtag
nah skyrim would be released before doom
So, if it‘s possible to change firmware of an Airtag, it would be possible to use it as an Ultrawideband controller for an RPI Pico or ESP32. The goal is to have the „find“ and „distance“ functions not only accessable from iPhones. It could be usable from microcontrollers too. That would be a nice project...
let's hope that TH-cam will not delete your video aas they did with the "Nintendo Game & Watch" one.
One giant corporation shielding another giant corporation while lawmakers bow down before them…we really live in a dystopia
it's on my PC btw
You know it's just a matter of time.. a gang of mealy-mouthed so and so's.. use youtube-dl, yt-dlp etc.. to preserve it offline.
What was wrong with it?
@@gamechep, Nintendo got TH-cam to take it down. Nintendo generally don't want people hacking their hardware and will gladly harass, lodge DMCA requests for the mildest of reasons.. In this case, the Game & Watch hacks were a full dissection of the device, at a software and hardware level, greatly extending the device's potential and use.
Thanks for showing your "draft soldering", now I know it's not just me!
Wow. Amazing work! Had been watching your videos for a while now, this gave me a great reason to subscribe and follow your work! Great job!
So realistically you could give someone a hacked airtag and have them install a compromised app that talks to the airtag and use the accelerometer as a microphone?
How much memory is there on an airtag? I mean how long could the airtag record before it would need to talk to a phone to upload the recording. You could have airtags recording and acting as bugs and only download the content when the memory is full.
Whenever I see you upload, I konw it will be fun entertaining and a bit out of the ordinary.
I find it comedic that apple released a product that’s being used as more of a test board then it’s actual intended purpose
When you talked about the rickroll part I laughed out loud. Amazing man, thanks for making this.
Can you also try it with the Samsung Galaxy SmartTags pls
Great Video!
I especially love how pretty much all of your recent hardware hacking videos can theoretically be replicated if you just have a Raspberry Pi Pico, some level shifters, and a breadboard.
I haven't tried any of it yet (and to be frank I don't understand too much about low-level electronics, my understanding more or less starts at logic gates), but the fact that it doesn't need super fancy equipment makes it so much more accessible!
Haha thank you! It's funny, cause at first I was like "Why do we need Pico", and now I love it.
And I think it's important to show that you don't need the highest-end devices to do cool things!
Man you are a Genius!!!!, this video was great.
I only understood 5%, but I watched all.
Congrats.
This is was great too learn about! What would you use a hacked/jailbroken AirTag for?
The first time i saw it i thought.....hmmmm free data :)
Start deploying IOT data that gets delivered for free?
This is simply satisfying to watch. Great work (and I really appreciate people mentioning sources). Way to go!
Very nice! I'd love to see someone build a "jig" that you can just place the airtag into to jailbreak the device without having to solder to the pads, like a modchip. Also is that an external antenna port I see on the PCB?
To be fair, I understand nothing in this video, however this guy is very very invested in it, and it really shines through to the point where I actually don't mind watching it..
You have immense skill. I'm glad you share it :)
By getting access to the firmware couldn't you bypass apple's anti stalking mechanics making it an even bigger threat?
No, thats done on the iphone side. The airtag just says hi, and the iphone determines location, whether to broadcast, etc.
The anti stalking feature has the side effect of making it useless for what I'd actually want to do : track my car or backpack in case it is stolen without alerting the thief that they are being tracked. The anti-stalking feature also makes it impractical to so one of these into your child's clothes to be able to track them in case they are ever kidnapped. Anyone who is riding with the child would essentially be notified that there is a tracking device.
I wonder if maybe there would be a way to get the device to present itself as a different device periodically so as to throw off the anti-stalking detection of the phones.
I LOL’d at the Rick roll part. Absolutely genius. I love it all.
Hey @stacksmashing! Very nice video. I'm actually trying to reproduce your glitch on another device that has an nRF52832 for a master's thesis. Now I'm wondering: How did you identify the external decoupling capacitor (and its test point) on the airtags? Would you have a keyword for me for follow up research?
Mostly you can find the pin connected to the capacitor in the datasheet. They will call it core-vcc for example. (I did not check how it is written in the nrf datasheet).
Ps. I just read that you comment is one year old. I hope you could found it out on time ;-)
why is the debugging an option that can be enabled on products that are shipped?
I mean wouldn't it be more secure for them to exclude that?
It's easier / cheaper to make a single version than a development version and various locked down versions for each chip. These development features are useful, and it may be desirable to use the same chip for development and production instead of just hoping they work the same.
it IS disabled. however he manages to disrupt the CPU so it executes a dead if-branch.
Of course this most likely needs to be timed down to the microseconds
Removing all the debug features in the hardware and software might introduce more bugs - so then how do you debug the device if you as the developer are locked out of all of your diagnostic tools?
It's simply a bad idea to make significant changes to the device between development and production. There needs to either be a developer backdoor or kill switch so that you can essentially test on the same device that you intend to sell.
I kinda understand the logic and programming and circuits, but I have no clue about how to get from zero to that point. Amazing video!
What's fascinating is that now that you have the firmware dump and verified that the AirTag allows for unauthenticated firmware writes, you could theoretically overwrite any arbitrary AirTag with custom firmware for nefarious means. Disassembling and reassembling an AirTag would not show any obvious signs of tampering, so you could totally perform an evil maid style attack on one and the mark would be none the wiser.
Nice job man, already really enjoy your Twitter feed, looking forward to what we can further get out of this!
"Please be carful while trying this at home" - Got your sarcasm
What's the URL that it normally sends you to? does it contain variables like the device or name?
I've read about this. Gut gemacht!
Wow I am noob but 1 year back I thought about this fault injection now I am seeing you actually doing it made my day love from 🇮🇳
Holy crap, youve earned a sub.
Hey, can you make software to turn an action camera to a dash cam. Like make it start recording when turned on and stop recording when turned on. Also make it delete old footage while recording new footage. Thanks
As someone who've designed multiple PCB, I must say I'm impressed with the voltage glitching technique. I've never heard of that and I wouldn't have thought of this to make the ucontroller jump instructions. Great video!
You did an amazing job explaining what you did and with my background understood completely. Great video!
Apple: "New for 2021, we are releasing these homing devices to keep track of your location at all times. But don't worry, they're totally safe."
if you don't happen to have an android
because if so well get stalked by people that just slip it somewhere lol
This is pretty cool. I didn't even know Apple Airtags were a thing. But i think it's pretty neat you were able to hack them and i can imagine you can have a lot of fun with these. I wonder if you can write a program to wirelessly program them now.
Nicely done! One of the many things I would like to reproduce one day :D
Yeah we would all like to reproduce someday
Wondering if this could be used to give the tracker some sort of compatibility with Android, even if not through the Find My network
Ready to Rick-Roll people!
I’m not sure what just happened but I liked it. Great job !
When they tell you to turn it off and on again and you enable debugging mode instead xD.
Will this make the AirTags unsafe from now on? I mean someone could dump the firmware and modify it so a nearby device won't tell potential victims of the location of the airtag (Apple claims that these can't be hidden and used to track people so this could open that.... Right?)
Lets count how many hours it take for apple to send a false copyright strike
@Kent talks tech ninndo does it all the time, every time the see a modding video
@Kent talks tech never say never
How does this voltage fault injection really work ? I mean to skip instructions the Instruction pointer register must be incremented significantly to skip the debug routine. But after we cut the power we basically disallow the IP to increment at all, so what gives ?????
i didnt understood anything :(
but this was cool:)
huh he expains it SO clearly
@@maicod if it's not your field of interest, you still won't understand. I have no clue also, but understand that it's well explained. 🤣
@@BradK02 ok you got a point there
Invest more skill points in IQ
Hey...I am trying to learn this subject right now and i was wondering if you have any recommended learning resources that i could follow. thank you so much!!❤️
gonna watch this before its gone :D
I have no idea what is an AirTag but I like this
The only usage for me is going to be my airport checked in bags, so I can track the distance between my seat and the bag :D
And if it shows nothing, and your bag at your destination isn't there, then you know it got left behind
The rickroll was genius I subbed
I'm surprised you can just flash it like that, you'd think Apple would have picked something you can lock down more.
I guess they got tired of the lockdown..
i am 100% sure they forgot
Couldn't flashing it with something run the risk of bricking it and void the warranty on it? The way i see it apple gets to sell more
Fantastic video. Your explanation of the chip and attack was extraordinary. You made a complex topic approachable.
Your videos are extremely overwhelming🙂
I dont know which is better, hacking the airtags,
or rick rolling the one who finds your item
Now, you need to connect two GameBoys via Airtags
I really have no idea what you said or did but the idea of jailbroken air tags is really awesome and i can't wait to see what people do with them
i like to pretend i understand what hes saying
These are the videos worth millions of views
Sweet!
Good work, kudos to you mate. Just curious, is that Segger j-link original or a clone ? If so, where'd you get it from ?