More on the defcon device that can spoof ios password sharing prompts – Breaking News & Latest Updates 2026
Skip to main content
N
Youtube
More on the DefCon device that can spoof iOS password sharing prompts.

TechCrunch’s Lorenzo Franceschi-Bicchierai has more on Jae Bochs, the hacker at DefCon who was able to spoof the iOS password sharing prompt on iPhones. Turns out they used a $70 device to spoof Bluetooth Low Energy packets — and since the Control Center toggle for WiFi and Bluetooth doesn’t actually turn those radios off, the signals were able to get through.

Bochs also said they created a proof-of-concept that “builds a custom advertisement packet that mimics what Apple TV etc. are constantly emitting at low power,” effectively spoofing an Apple device that tries to repeatedly connect to nearby devices and triggers the pop-ups. [...]

Unlike real Apple devices, his contraption wasn’t programmed to collect any data from nearby iPhones, even if the person tapped and accepted the prompts. But, in theory, they could have collected some data, according to Bochs.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Comments
Loading comments
Getting the conversation ready...