mirror of
https://github.com/JGoyd/iOS-18.5-Bluetooth-Privacy-Vuln.git
synced 2026-02-12 12:53:04 +00:00
Update README.md
This commit is contained in:
committed by
GitHub
parent
f22901b6b0
commit
9ae641ff6c
@@ -19,7 +19,7 @@ The research was performed using official Apple tooling (Console.app) on a **sto
|
||||
|
||||
| ID | Component | Description | Impact |
|
||||
|----------|------------------------|--------------------------------------------------|--------------------------------------------|
|
||||
| VF-001 | `audioaccessoryd` | Surfaces Bluetooth trust metadata (e.g. IRKs) | Passive identity tracking |
|
||||
| VF-001 | `audioaccessoryd` | Surfaces Bluetooth trust metadata (e.g. IRKs) | Passive identity tracking |
|
||||
| VF-002 | `SPCBPeripheralManager`| Triggers silent BLE scans in background | Device becomes discoverable without notice |
|
||||
| VF-003 | `locationd` | Covert GPS harvesting without UI or consent | Silent location tracking |
|
||||
| VF-004 | `tccd` | Bypasses TCC privacy permissions using a flag | Consent enforcement disabled |
|
||||
@@ -29,4 +29,4 @@ The research was performed using official Apple tooling (Console.app) on a **sto
|
||||
|
||||
## Why This Matters
|
||||
|
||||
Silent BLE scans, exposed Bluetooth metadata, and covert GPS activation defeat the privacy model users expect: devices can be tracked, paired identities de-anonymized, and location harvested without consent or UI notice. That turns everyday iPhones into persistent surveillance beacons and nullifies app/OS permission controls.
|
||||
Silent BLE scans, exposed Bluetooth metadata, and covert GPS activation defeat the privacy model users expect: devices can be tracked, paired identities de-anonymized, and location harvested without consent or UI notice. That turns everyday iPhones into persistent surveillance beacons and nullifies app/OS permission controls.
|
||||
|
||||
Reference in New Issue
Block a user