How the Apple AirTags were hacked

Поділитися
Вставка
  • Опубліковано 28 тра 2024
  • On Saturday, I managed to dump the firmware of the newly released Apple AirTags - and in this video I'll show how I did it.
    I won't share firmware dumps or so, so please don't ask :)
    Links:
    - Colin on Twitter: / colinoflynn
    - Colin on UA-cam: / @colinoflynn
    - Colin's company: www.newae.com
    - LimitedResults Appprotect bypass: limitedresults.com/2020/06/nr...
    - LimitedResults Pocketglitcher: limitedresults.com/2021/03/th...
    My links:
    - Twitter: / ghidraninja
    - Patreon: / stacksmashing
    - Pico Debug'n'Dump board: gum.co/picodnd
    Timestamps:
    00:00 Intro
    00:10 AirTags hardware
    01:40 Debugging interface
    02:35 Fault-Injection
    04:30 Glitching the AirTags
    05:50 Hardware Setup
    07:10 Lets Glitch
    07:56 Firmware modification
  • Наука та технологія

КОМЕНТАРІ • 1,7 тис.

  • @EpicLPer
    @EpicLPer 3 роки тому +4442

    Next thing to do: Get the AirTag to RickRoll you via its speaker.

    • @SaiCode
      @SaiCode 3 роки тому +58

      Yesss Please

    • @steve_1507
      @steve_1507 3 роки тому +28

      That would be a very nice joke

    • @TravisStamper
      @TravisStamper 3 роки тому +22

      This just won the internet!

    • @PiduguSundeep
      @PiduguSundeep 3 роки тому +9

      Exactly my thoughts after watching this video.

    • @micahrogers7536
      @micahrogers7536 3 роки тому +8

      Or have it open the rickroll youtube url via nfc

  • @devinmarx5032
    @devinmarx5032 3 роки тому +8142

    It would be hilarious for you to go back into the Apple store and tell them your AirTags aren’t working only for them to get Rick rolled!

    • @spectraljake9056
      @spectraljake9056 3 роки тому +423

      This is how you get kicked out.

    • @missingno2401
      @missingno2401 3 роки тому +48

      good idea

    • @_BangDroid_
      @_BangDroid_ 3 роки тому +568

      @@spectraljake9056 That would be an honour. I've never set foot inside an Apple store, getting kicked out my first time would be the best

    • @colt5189
      @colt5189 3 роки тому +46

      @@spectraljake9056 Would that be a permanent kicking out? Or just to leave for the day?

    • @liucyrus22
      @liucyrus22 3 роки тому +60

      @@colt5189 they can’t force you to give them your name. They can probably take pictures of you though.

  • @robinator18ps3
    @robinator18ps3 3 роки тому +213

    The real skill show here is not your hardware hacking (which is REALLY cool).
    The real skill here is the way you can simplify everything enough for most people to understand without sacrificing details for the ones that can appreciate it.
    THIS is how you get more people into a field.
    Keep sharing and encouraging people to follow up on their curiosities to find out how stuff work!

  • @hellschatt
    @hellschatt 3 роки тому +200

    I'm not involved much in hacking but that skip of the debug check with the voltage is mindblowing to me. Didn't know this was possible, and didn't know that people implement a debug mode like that in such chips.

    • @theairstig9164
      @theairstig9164 Рік тому +1

      Have a look at security testing if hardware under the Common Criteria

    • @SloppyPuppy
      @SloppyPuppy Рік тому

      Very common in embedded devices, wanna see more of this voltage glitching action, search for "How I hacked a trezor wallet worth $2 million.

  • @MisterLiker
    @MisterLiker 3 роки тому +2052

    Apple: "The AirTags are totally safe."
    Stacksmashing: _"Hold my Raspberry Pico."_

    • @xtreme571
      @xtreme571 3 роки тому +36

      Right? He's like "normally you would use an FPGA" and throws a Raspberry Pi Pico at it.

    • @kylemwalker
      @kylemwalker 3 роки тому +58

      I mean, your airtags are safe unless someone physically gets their hands on it, breaks it open, solders wires to it, etc. The airtag is still safe from remote hacking

    • @zornsllama
      @zornsllama 3 роки тому +32

      @@kylemwalker yes, this is way outside the threat model. Air tags are still safe in the sense Apple meant :)

    • @keiyakins
      @keiyakins 3 роки тому +23

      Unless you don't own an Apple device with which to use their warning thing. Then they're a stalker's wet dream, and frankly criminally negligent to release.

    • @zornsllama
      @zornsllama 3 роки тому +16

      @@keiyakins I’ve done some quick reading and it seems you’re right, the current firmware leaves a fair bit to be desired. Hopefully they fix this. It’s worth noting that I can buy a 4G-enabled chip that could do something similar with zero restrictions for not a lot of money from aliexpress.

  • @mikeak7331
    @mikeak7331 3 роки тому +4633

    “Be careful when you try this at home” because I understand all of this technical stuff completely... haha. Great video.

    • @gh8447
      @gh8447 3 роки тому +14

      @@francoisdang Just reported his post for 'Unwanted commercial content or spam'. Post gone (for me at least)! 😄

    • @NathanaelTan
      @NathanaelTan 3 роки тому +24

      @@gh8447 Can confirm whatever you reported is indeed gone 🙃

    • @ImPattMan
      @ImPattMan 3 роки тому +9

      I mean, they did all the hard work, and basically wrote a guide on what you need to do. So I'd venture many people could repeat this at home if they work on their soldering skills a bit!

    • @fanuchman
      @fanuchman 3 роки тому +2

      I will definitely be trying this.
      A little searching and you too can understand all the content in the video.

    • @Custmzir
      @Custmzir 3 роки тому +2

      @@gh8447 which comment? What was it about?

  • @shrubfromtomorrow
    @shrubfromtomorrow 3 роки тому +248

    I don't understand anything but I watched every second and nodded my head like it made sense

    • @centinstudios
      @centinstudios 3 роки тому +1

      Because of the German accent? XD

    • @shrubfromtomorrow
      @shrubfromtomorrow 3 роки тому +2

      @@centinstudios no, I dont understand circuitry at all

    • @RusselGuinarez
      @RusselGuinarez 3 роки тому

      same here bro

    • @MovieCaveDave
      @MovieCaveDave 2 роки тому

      Annnnd that was me as well…

    • @fitybux4664
      @fitybux4664 2 роки тому

      This is basically a case of "security by obscurity". Nordic Semiconductor (nRF) engineers would say: "we never expected anyone to do that...". They could probably protect the next generation of chips by having some internal capacitance to make it harder to glitch externally.

  • @rowans.corner
    @rowans.corner 3 роки тому +97

    5:01
    Other channels: Don't try this at home!
    Stacksmashing: Be careful if you try this at home.

    • @chronophagocytosis
      @chronophagocytosis 3 роки тому +3

      That's because the justice system in USA is so messed up that you have to include silly disclaimers and warnings on everything. The rest of the world developed in a different direction. If you screw up, it's your own fault and and can't sue anyone for it. The best thing you can do is to look in the mirror. In America though... oh it got pretty wild and that's why the "don't try this at home" slogan even exists.

  • @KyleAwsm
    @KyleAwsm 3 роки тому +1418

    I am continually blown away by your videos, how you lay everything out so clearly, and the skill with which you do all that you do. I strive to be able to do things like this. Great work, man!

    • @stacksmashing
      @stacksmashing  3 роки тому +95

      Thank you so much! I'm glad you enjoyed it :)

    • @esotericsean
      @esotericsean 3 роки тому +6

      Hah, funny seeing you here! Love this guy's videos too :)

    • @CMAC86
      @CMAC86 3 роки тому +3

      @@esotericsean hey Sean do you not create videos anymore on UA-cam? Loved some of your original vids.

    • @esotericsean
      @esotericsean 3 роки тому +3

      @@CMAC86 I plan on returning soon! Just had some big (really good) life changes this past year :)

    • @watchlistsclips3196
      @watchlistsclips3196 3 роки тому +1

      @@esotericsean @James Reaction @ stacksmashing
      Wow.I am seeing one great youtuber loving videos of an awesome youtuber who is blown away by other mind blowingyoutuber. You three are awesome.You are providing amazing content.Love you three.

  • @marcmiyamoto
    @marcmiyamoto 3 роки тому +48

    In Apple headquarters: *nervous sweating*

    • @musteycraft9854
      @musteycraft9854 3 роки тому +7

      Cant wait to apple to make a v2 wich is glued down

  • @eric-id6bk
    @eric-id6bk 3 роки тому +68

    I'm actually pretty surprised that I understood most of this, I've got very limited hardware / low-level experience. Awesome video!

  • @whytushar
    @whytushar 3 роки тому +4

    Saw your tweet and was impressed, watched your video and I'm in awe. Good job, man!

  • @hydejel3647
    @hydejel3647 3 роки тому +212

    Every new video of yours potentially extends lifespan of these devices by a lot. Your research is ground breaking every time!

  • @philrod1
    @philrod1 3 роки тому +220

    All the way through this video I was thinking "This is cool, but what's the use?" 8:03 answered that question beautifully :D

    • @stephenfgdl
      @stephenfgdl 3 роки тому +3

      I think it's a little obvious you can spy on someone and not get their information .... hahaha

    • @TheDanm22
      @TheDanm22 2 роки тому

      Still no clue.

    • @TheDanm22
      @TheDanm22 2 роки тому +1

      Iphone users will buy anything.

    • @RadDadisRad
      @RadDadisRad 2 роки тому

      @@TheDanm22 nah, you just believe they will.

    • @TheDanm22
      @TheDanm22 2 роки тому

      @@RadDadisRad you are 10ply.

  • @orion10x10
    @orion10x10 Рік тому +40

    You're like the NileRed of hardware hackers, I'm almost done with my 2 year degree in Cybersecurity and this video is teaching me a lot.

    • @stacksmashing
      @stacksmashing  Рік тому +11

      Now that's a compliment! Thanks! Glad you enjoyed it!

  • @paulgray1318
    @paulgray1318 3 роки тому +9

    Love the brute force loop - automating the grind out of the fun, smashed it.

  • @marsanmarsipan
    @marsanmarsipan 3 роки тому +122

    Bitcoin Mining on AirTags incoming

    • @stacksmashing
      @stacksmashing  3 роки тому +21

      This is the way

    • @densho9057
      @densho9057 2 роки тому

      @@inkybz but not my phone please

    • @mrgw98
      @mrgw98 2 роки тому +5

      @@inkybz Yet another reason I like that Android gives you the option to turn off NFC.

    • @Adaephonable
      @Adaephonable 2 роки тому

      @@inkybz botnet sure, mining cluster would be useless. Phones are a terrible choice for miners.

    • @yDeathAngely
      @yDeathAngely 2 роки тому

      @@Adaephonable Yes but if you place one of this airtags at an airport or so you can get a lot of phones and this can add up. One phone isn't gread but 1000 or 10,000...

  • @joshuavincent7884
    @joshuavincent7884 3 роки тому +93

    Concise, informative and entertaining...what more can we ask?

  • @RustOnWheels
    @RustOnWheels 2 роки тому

    This is simply satisfying to watch. Great work (and I really appreciate people mentioning sources). Way to go!

  • @fevermeds
    @fevermeds 3 роки тому +1

    Fantastic video. Your explanation of the chip and attack was extraordinary. You made a complex topic approachable.

  • @BaumInventions
    @BaumInventions 3 роки тому +229

    You got featured at "TechLinked" in the "If you cant buy a graphics card" episode at around 4:20 ... noice.

    • @stacksmashing
      @stacksmashing  3 роки тому +64

      Ohh cool, thanks for letting me know! :)

    • @bhavyakabade
      @bhavyakabade 3 роки тому +11

      @@stacksmashing yeahhh Techlinked got me here

  • @bryteklabs1855
    @bryteklabs1855 3 роки тому +14

    I just saw Hak5 coverage for this and was looking for the video! Great timing and good job.

  • @Dac_vak
    @Dac_vak 3 роки тому +2

    Absolutely phenomenal video as usual. Love your channel so much!

  • @jonathanriggins5451
    @jonathanriggins5451 3 роки тому +1

    You did an amazing job explaining what you did and with my background understood completely. Great video!

  • @Qsie
    @Qsie 3 роки тому +63

    Never considered doing this myself, but just the _idea_ that this works is both extremely entertaining and rather educational 😄

  • @williambrasky3891
    @williambrasky3891 3 роки тому +8

    Definitely looking forward to getting one of those pico based tools. You are awesome! Thanks for sharing all of this with us!

  • @jesseshakarji9241
    @jesseshakarji9241 3 роки тому +150

    I'm a computer engineering student and I'd love to get better at understanding hardware hacking. Your explanation of "glitching" was really good. Is there any resources or other videos I could check out to learn more about hardware hacking like this?

    • @joeds3775
      @joeds3775 2 роки тому +9

      Look at the sites this guy reccomends.
      Do the same for them. Eventually you have a bank of experts you can trust and learn from.

    • @joemck85
      @joemck85 2 роки тому +7

      There's also a bunch of good stuff in whatever-number-C3 talks. Notably ones revealing some new flaw found in some game console to allow homebrew often contain some serious hardware hacking talk. "Nintendo Hacking 2016" and "Console Hacking 2016" come to mind, and tend to be a mix of super low level hardware hackery such as MITMing a PCIe bus or using external hardware to dump RAM chips of a live system, and software analysis.

    • @RafaelKarosuo
      @RafaelKarosuo 2 роки тому

      @@joemck85 I remember seeing one of those talks in hackaday a while back, but never thought about the nC3 thing, until now that I didn't understand the reference and had to look for, simple details silly me 😆

  • @josephdlist
    @josephdlist 3 роки тому +7

    I read an article on Ars technica about this and couldn’t wait for the video.

  • @ProjectV95
    @ProjectV95 3 роки тому +4

    Wow. Amazing work! Had been watching your videos for a while now, this gave me a great reason to subscribe and follow your work! Great job!

  • @omardude39
    @omardude39 3 місяці тому +1

    I understood absolutely everything you explained with basic electronics understanding. Very clearly explained and described.

  • @thatdude5104
    @thatdude5104 3 роки тому

    Nice job man, already really enjoy your Twitter feed, looking forward to what we can further get out of this!

  • @Phroggster
    @Phroggster 3 роки тому +8

    Nice work! I tend to avoid all products designed in Cupertino because they tend to only function with other products designed in Cupertino, but now it might be worthwhile thanks to you!

  • @GameMuse
    @GameMuse 3 роки тому +5

    You have immense skill. I'm glad you share it :)

  • @drchopsticks
    @drchopsticks 3 роки тому +1

    Due to the UA-cam algorithm I found your channel and am I sure glad I found your channel. The stuff you do is just so interesting

  • @bryansiepert9222
    @bryansiepert9222 2 роки тому +1

    As always, amazing content! I'd say that a more in-depth video would be nice, but this seems fairly simple. Not easy, simple! It would be a long time until I could pull something like this off but you do a great job of explaining your process.
    Actually, a video on reversing the firmware might be neat!

  • @sahbibg9680
    @sahbibg9680 3 роки тому +7

    Fantastic job dude ! Too much experience went into this short explanation

  • @4pThorpy
    @4pThorpy 3 роки тому +68

    I occasionally read through the "discovery" page on my phone (that page on android shows me targeted news) and yesterday while pooping I read the title "somebody has already hacked apples airtags"...should have known it'd be you.

  • @BinarySpike
    @BinarySpike 2 роки тому

    This is great, I'm looking at flashing the TG7100C. This showed some concrete examples of what I was reading about-Thanks!

  • @benwilliam1010
    @benwilliam1010 3 роки тому +1

    awesome summarz of your work, thank you!

  • @IamTheHolypumpkin
    @IamTheHolypumpkin 3 роки тому +6

    Whenever I see you upload, I konw it will be fun entertaining and a bit out of the ordinary.

  • @brandonh1613
    @brandonh1613 3 роки тому +3

    This is so cool! I am excited to see how people utilize this to incorporate airtags into their own projects

  • @M_tch311
    @M_tch311 3 роки тому +18

    Learned more about reverse engineering than any of my classes, thanks!

  • @JonMurray
    @JonMurray Рік тому

    This was awesome man! New subscriber ✌🏻

  • @o0julek0o
    @o0julek0o 3 роки тому +55

    Well that took like a week. Very cool.

  • @TheFerdi265
    @TheFerdi265 3 роки тому +4

    Great Video!
    I especially love how pretty much all of your recent hardware hacking videos can theoretically be replicated if you just have a Raspberry Pi Pico, some level shifters, and a breadboard.
    I haven't tried any of it yet (and to be frank I don't understand too much about low-level electronics, my understanding more or less starts at logic gates), but the fact that it doesn't need super fancy equipment makes it so much more accessible!

    • @stacksmashing
      @stacksmashing  3 роки тому +6

      Haha thank you! It's funny, cause at first I was like "Why do we need Pico", and now I love it.
      And I think it's important to show that you don't need the highest-end devices to do cool things!

  • @syke384
    @syke384 3 роки тому +1

    Hey...I am trying to learn this subject right now and i was wondering if you have any recommended learning resources that i could follow. thank you so much!!❤️

  • @Daniel-qy9mb
    @Daniel-qy9mb 2 роки тому

    I love honesty. Great job bro.

  • @MartinDerTolle
    @MartinDerTolle 3 роки тому +556

    Now all that is left to do is amplify the nfc so you can rickroll everyone in your surroundings

    • @theterribleanimator1793
      @theterribleanimator1793 3 роки тому +39

      what kind of VILE, UNSPEAKABLE EVIL CREATED YOU, MONSTER?

    • @WalterMan
      @WalterMan 3 роки тому +13

      Is that even possible? lol

    • @kenopyowo
      @kenopyowo 3 роки тому +6

      @@WalterMan yeah i'd like to know too

    • @theterribleanimator1793
      @theterribleanimator1793 3 роки тому +13

      @@kenopyowo probably not, probably wouldnt be legal either. Too much of a nuisance

    • @kaukospots
      @kaukospots 3 роки тому +38

      @@WalterMan absolutely not, NFC is powered/initiated by your phone not the device itself

  • @siegmundeurades5753
    @siegmundeurades5753 3 роки тому +3

    Things like these are why I'm studying electronics. Great work man!

    • @rahatpreo3209
      @rahatpreo3209 2 роки тому

      Studying Electronics is supper fun.

  • @jessgone
    @jessgone Рік тому

    nice work, combining all the tools!

  • @echo_lite
    @echo_lite 3 роки тому

    Was not interested in this area, but you did really good job and now I have some ideas what I could do, thank you

  • @TechNo1geek
    @TechNo1geek 3 роки тому +13

    "So be careful when you do this at home"
    I'm not even rich enough to get a TAXI to a Apple store

  • @electricketchup
    @electricketchup 3 роки тому +5

    You never give up, and you never let me down.

  • @zomfgwtfbbq1
    @zomfgwtfbbq1 2 роки тому

    You're really good at explaining stuff.

  • @VarunMehra204
    @VarunMehra204 2 роки тому

    Great video and amazing work! Greetings from Canada!

  • @sanches2
    @sanches2 3 роки тому +8

    There is a thing called brown out reset. You can check for that flag during the debug lock procedure. If the flag is risen at all :) Great video and a presentation, thank you!

  • @JamesReaction
    @JamesReaction 3 роки тому +874

    I don't even know why I'm watching..... But I am.. 😅

    • @abellthomas1978
      @abellthomas1978 3 роки тому +4

      maybe to react to it😂

    • @apu_apustaja
      @apu_apustaja 3 роки тому +5

      I know exactly what you mean. Let me tell you why you're here. You're here because you know something. What you know you can't explain, but you feel it. You've felt it your entire life. That there's something wrong with the world, you don't know what it is, but it's there. Like a splinter in your mind, driving you mad. It is this feeling that has brought you to me. Do you know what I'm talking about?

    • @__Pre
      @__Pre 3 роки тому +9

      Kinda weird how people automatically like a comment from a verified person without having a single reason to

    • @gjkrisa
      @gjkrisa 3 роки тому

      Let’s you know what can be done and how they do it. Your iPhone security if they have direct access they can use these techniques to find what on the phone although would take much longer to do and probably are other better ways in but just another tool in the tool box

    • @highstereolove
      @highstereolove 3 роки тому

      @@__Pre or they genuinely like and agree with the comment? 😑

  • @StefanSchlott
    @StefanSchlott 3 роки тому

    Oh, that Debug'n'Dump board looks niiiiice! 😍

  • @DEJS3
    @DEJS3 3 роки тому +1

    You explained the concept so elegantly that it made me realize the RGH (Reset Glitch Hack) hack for the Xbox 360 used a very similar methodology to achieve code execution.

  • @Jayanky
    @Jayanky 3 роки тому +71

    Can’t wait to play doom on an airtag

    • @kekc2181
      @kekc2181 2 роки тому +1

      nah skyrim would be released before doom

  • @Scrogan
    @Scrogan 2 роки тому +3

    Very good work! I wonder about what the apple IC is doing in there, considering the NRF is already an onboard microcontroller and it doesn’t exactly need tons of processing power.

    • @StuartZiane
      @StuartZiane 2 роки тому +1

      UWB - Ultra WideBand radio. I won't explain what it is and how it works, but the AirTag and compatible devices use UWB radio to measure how long it takes radio signals to travel between the devices - i.e. "Time Of Flight (TOF)". This allows the devices to measure the distance between themselves.

  • @A2CVMAN
    @A2CVMAN 2 роки тому

    Brilliant piece of experimental work.

  • @MrAtom631
    @MrAtom631 3 роки тому

    This is great channel, you have my subscribe!

  • @postbreak
    @postbreak 3 роки тому +12

    Very nice! I'd love to see someone build a "jig" that you can just place the airtag into to jailbreak the device without having to solder to the pads, like a modchip. Also is that an external antenna port I see on the PCB?

  • @jpjapers
    @jpjapers 3 роки тому +16

    Just wait til they start filling the casing with resin now.

  • @sensiblewheels
    @sensiblewheels 3 роки тому

    This was amazing! Subscribed.

  • @squorsh
    @squorsh 3 роки тому

    I really have no idea what you said or did but the idea of jailbroken air tags is really awesome and i can't wait to see what people do with them

  • @rootshell101
    @rootshell101 3 роки тому +87

    let's hope that UA-cam will not delete your video aas they did with the "Nintendo Game & Watch" one.

    • @flippa4220
      @flippa4220 3 роки тому +19

      One giant corporation shielding another giant corporation while lawmakers bow down before them…we really live in a dystopia

    • @brandontechnerd
      @brandontechnerd 3 роки тому +3

      it's on my PC btw

    • @TattiePeeler
      @TattiePeeler 3 роки тому +1

      You know it's just a matter of time.. a gang of mealy-mouthed so and so's.. use youtube-dl, yt-dlp etc.. to preserve it offline.

    • @gamechep
      @gamechep 3 роки тому

      What was wrong with it?

    • @TattiePeeler
      @TattiePeeler 3 роки тому +2

      @@gamechep, Nintendo got UA-cam to take it down. Nintendo generally don't want people hacking their hardware and will gladly harass, lodge DMCA requests for the mildest of reasons.. In this case, the Game & Watch hacks were a full dissection of the device, at a software and hardware level, greatly extending the device's potential and use.

  • @purerizzo
    @purerizzo 3 роки тому +4

    Thanks for showing your "draft soldering", now I know it's not just me!

  • @jimjab3631
    @jimjab3631 3 роки тому

    I admire your knowledge and skill set.

  • @hef3281
    @hef3281 2 роки тому

    this video was lit af, thanks for the content

  • @bmilejski
    @bmilejski 2 роки тому +3

    Hey @stacksmashing! Very nice video. I'm actually trying to reproduce your glitch on another device that has an nRF52832 for a master's thesis. Now I'm wondering: How did you identify the external decoupling capacitor (and its test point) on the airtags? Would you have a keyword for me for follow up research?

    • @undergroundradio11
      @undergroundradio11 Рік тому

      Mostly you can find the pin connected to the capacitor in the datasheet. They will call it core-vcc for example. (I did not check how it is written in the nrf datasheet).
      Ps. I just read that you comment is one year old. I hope you could found it out on time ;-)

  • @Carterthielftw_
    @Carterthielftw_ 3 роки тому +5

    Holy crap, youve earned a sub.

  • @chiragchandra1779
    @chiragchandra1779 3 роки тому

    wow, amazing work man. Though i didn't understand anything but it looked amazing

  • @noodlecake7108
    @noodlecake7108 3 роки тому

    I didn't understand a thing but I subscribed just because of the amount of time you must have put in to this video!

  • @arturofernandez8487
    @arturofernandez8487 3 роки тому +3

    This is WILD! Congrats for your job man

  • @superhero1
    @superhero1 3 роки тому +10

    Nicely done! One of the many things I would like to reproduce one day :D

    • @gammoron632
      @gammoron632 3 роки тому +1

      Yeah we would all like to reproduce someday

  • @ryzlot
    @ryzlot 7 місяців тому

    WOW - excellent video!
    JR

  • @muelmanu
    @muelmanu 3 роки тому

    Entertaining Thomas! Great Work!

  • @ahtoshkaa
    @ahtoshkaa 3 роки тому +9

    I have no idea what Airtag is, i have no idea what you were talking about, but i watched the whole video from start to finish and it was mesmerizing!

  • @mashtonish
    @mashtonish 3 роки тому +3

    best channel ever

  • @TechieGanesh
    @TechieGanesh 3 роки тому

    your skills are exceptional! cant wait to try this on my airtag :)

  • @derTommy
    @derTommy 2 роки тому

    Großartig wie immer! Danke!

  • @thevideoman12
    @thevideoman12 3 роки тому +14

    I've read about this. Gut gemacht!

  • @jamin959
    @jamin959 3 роки тому +5

    This is was great too learn about! What would you use a hacked/jailbroken AirTag for?

    • @DeanCollinsVideos
      @DeanCollinsVideos 3 роки тому

      The first time i saw it i thought.....hmmmm free data :)
      Start deploying IOT data that gets delivered for free?

  • @sebrura
    @sebrura Рік тому

    10/10 video. Perfectly explained, good tempo. 👍🏻

  • @shubhambhanot5547
    @shubhambhanot5547 6 місяців тому

    that debuging direct from chip using voltage -- mind blowinggg

  • @peir5074
    @peir5074 3 роки тому +7

    When you talked about the rickroll part I laughed out loud. Amazing man, thanks for making this.

  • @izerpizer
    @izerpizer 3 роки тому +4

    I LOL’d at the Rick roll part. Absolutely genius. I love it all.

  • @83daaj
    @83daaj 3 роки тому +1

    I’m not sure what just happened but I liked it. Great job !

  • @LazyBunnyKiera
    @LazyBunnyKiera 3 роки тому +2

    This is pretty cool. I didn't even know Apple Airtags were a thing. But i think it's pretty neat you were able to hack them and i can imagine you can have a lot of fun with these. I wonder if you can write a program to wirelessly program them now.

  • @hammerfix7241
    @hammerfix7241 3 роки тому +6

    gonna watch this before its gone :D

  • @EpicLPer
    @EpicLPer 3 роки тому +8

    Ready to Rick-Roll people!

  • @ralphshse1955
    @ralphshse1955 3 роки тому

    I have no idea what you just did, but i loved the video!

  • @emremutlu44
    @emremutlu44 3 роки тому

    Wow :D I'm new to this. Learned so much in a brief 8 mins. of your talking :D Thanks!!! Subbed!

    • @vietmaxim5244
      @vietmaxim5244 2 роки тому

      C•r•y•p•t•o = i•n•v•e•s•t•m•e•n•t
      W•h•a•t•s•A•p•p =
      N•u•m•b•e•r•s = +1 (5•1•6) (4•7•6)‑(8•0•3•4)

  • @NeoRazor
    @NeoRazor 3 роки тому +4

    Apple: "New for 2021, we are releasing these homing devices to keep track of your location at all times. But don't worry, they're totally safe."

    • @maximiliandeisz2961
      @maximiliandeisz2961 3 роки тому

      if you don't happen to have an android
      because if so well get stalked by people that just slip it somewhere lol

  • @JamesDoesStuff0603
    @JamesDoesStuff0603 3 роки тому +5

    I find it comedic that apple released a product that’s being used as more of a test board then it’s actual intended purpose

  • @WinterSpire
    @WinterSpire 3 роки тому

    This is so underated!! Great Job

  • @pancakies5719
    @pancakies5719 3 роки тому

    I don’t know half the names you said but this was very cool!

  • @abhishekkamlesh1751
    @abhishekkamlesh1751 3 роки тому +6

    Your videos are extremely overwhelming🙂