When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
On the face of it, its a deviously clever exploit.
That means that any Bluetooth gear could feasibly be located by a person with access to the exploit.
The Apple AirTag
The researchers found that their method had a 90% success rate.
Whats more, it only took them a few minutes to locate a targeted gadget.
Its a scary combination when those kinds of capabilities are in the wrong hands.
In the case of the George Mason University exploit, thats not necessary because it can be triggered remotely.
The researchers say they notified Apple about the vulnerability in July 2024.
If you dont know why an app needs Bluetooth, do further research before simply opening the door.