A user in the UK has successfully experimented with tracking a parcel sent to a friend residing in a different city, using the “Where Is” network and step-by-step traffic monitoring with AirTag Included in the package.
To report it MacrumorsAnd the Quoting In turn, the Intego blog, explaining that the AirTag was installed in a carton, surrounded by a small envelope with bubbles and sent. The user, Kirk McKillhern, lives in the small town of Stratford-upon-Avon and has sent his AirTag card to a friend who lives in London.
Using the “Where Is” app on his iPhone, Kirk reports that he was able to track AirTag’s location, including access to the shipping facility and highly automated mail processing center. Of particular interest is the fact that Apple uses the “Where Is” network, where it collects data anonymously from nearby iPhones and iPads to determine location.
“It didn’t take long for the Airtag to start its journey. At 5.49, the commute began from Stratford-upon-Avon, it was supposed to be loaded into a truck that took it to its next destination; at 6.40 p.m., it left town and headed north,” writes Kirk. “At 7:30 p.m., it arrives at the South Midlands Post Sorting Office, which is a very automated mail processing center, a giant warehouse-like center where mail is sorted. Having even one employee with an iPhone and ‘where is’ is active is enough to determine the job but who There are likely many other employees who have an iPhone. “
Kirk created a custom script on his Mac to take a screenshot of the “Where Is” app every two minutes to record AirTag movements (the video is Visible On the Intego Blog); A few days later, AirTag reached its destination.
Apple has several mechanisms for privacy and preventing unauthorized tracking. Location and history data are not physically stored in AirTag. Connections to the Where network are protected by end-to-end encryption, so only the owner of the device can access AirTag location data, and no one will know the identity or location of the devices that helped find them. Even apples.
AirTag is also designed with a number of proactive features that discourage unwanted tracking. In addition, iOS devices can detect a remote AirTag from the owner and notify the user if someone else’s AirTag follows the same path for some time. And if the user does not have an iOS device, any AirTag that stays away from the owner for a long time will beep when moved, so as to attract attention. If someone detects an unknown AirTag, they can touch it with their NFC-enabled phone or device and follow the instructions to disable AirTag.
In this headline, our complete review of all the AirTag pros and cons.
“Devoted bacon guru. Award-winning explorer. Internet junkie. Web lover.”