How to transform the Apple's application 'Find My' into a toolbox for whistleblowers

03/31/2020
by   Amadou Moctar Kane, et al.
0

The recent introduction of Find My app by Apple will open a large window of opportunities for whistleblowers. Based on a short range Bluetooth signals, an EC P-224 encryption, and an end-to-end encrypted manner using iCloud Keychain, Find My app is probably the first application broadcasting a large number of anonymous public key on this scale. Hence, this new Apple's application may introduce a revolution in secret communication, if we divert it from its primordial use and transform it into a powerful tool to put in the hands of whistleblowers. By using Find My app and an entity authentication protocol based on artificial intelligence, our goal is to make mass surveillance and kleptographic backdoors ineffective in the lifting of the whistleblower's anonymity. However, in some case, Find my app may also be a powerful tool in the hands of dictatorships governments in their fight against whistleblowers and political adversaries. Thus, the aim of this paper is to show with simple examples, how these two previous situation can happen.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/18/2022

Analysis of Complex Survival Data: a tutorial using the Shiny MSM.app application

The development of applications for obtaining interpretable results in a...
research
07/18/2023

Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case

We conduct a large-scale measurement of developers' insecure practices l...
research
09/22/2020

App Parameter Energy Profiling: Optimizing App Energy Drain by Finding Tunable App Parameters

In this paper, we observe that modern mobile apps come with a large numb...
research
08/01/2018

Effective Caching for the Secure Content Distribution in Information-Centric Networking

The secure distribution of protected content requires consumer authentic...
research
11/19/2020

To Terminate or Not to Terminate Secure Sockets Layer (SSL) Traffic at the Load Balancer

The concepts of terminating or not terminating Secure Sockets Layer (SSL...
research
05/15/2022

Automation Slicing and Testing for in-App Deep Learning Models

Intelligent Apps (iApps), equipped with in-App deep learning (DL) models...

Please sign up or login with your details

Forgot password? Click here to reset