仔细看了论文,主要篇幅在于如何提高 AirDrop 所需要的 offline verification 的隐私程度。AirDrop 泄露 sender 的电话号码的 SHA-256 的原因真的很简单,也很容易复现。
2021 年才发现是因为这个协议是私有协议,开源 community 不太关心吧。想必各路情报部门早就知晓并持续利用过这些问题了。
在这个苹果爱好者论坛,居然一个回贴都没有。感觉诸位也就是叶公好龙而已。哈哈
贴一下链接和内文
https://www.usenix.org/system/files/sec21fall-heinrich.pdf3.3 Contact Identifier Leakage of Sender
During the AirDrop authentication handshake, the sender always
discloses their own contact identifiers as part of the initial
HTTPS POST /Discover message (cf. Fig. 1). A malicious
receiver can therefore learn all (hashed) contact identifiers
of the sender without requiring any prior knowledge of their
target. To obtain these identifiers, an attacker simply needs
to wait (e.g., at a public hot spot) until a target device scans
for AirDrop receivers, i.e., the user opens the AirDrop sharing
pane. The target device will freely send a discover message
to any AirDrop receiver found during the previous DNS-SD
service lookup. Therefore, an attacker can learn the target’s
validation record without any authentication by simply announcing
an AirDrop service via multicast DNS (mDNS).
After collecting the validation record, the attacker can recover
the hashed contact identifiers offline.