Skip to main content

All Questions

Tagged with
3votes
1answer
208views

How does the Apple/Google Exposure Notification system prevent infected users from being identified?

Under Apple and Google's contact tracing scheme, Alice's device generates a daily random value (termed a Temporary Exposure Key or TEK in the Cryptography Specification). Every 10 minutes, a Rolling ...
etc's user avatar
  • 131
1vote
1answer
2kviews

Apple bluetooth keyboard insecure connection?

From time to time, I see this dialog box pop up on my MacBook Pro screen. It typically happens as the computer wakes up from sleep. Magic keyboard is trying to connect using an unsecured Bluetooth ...
ahron's user avatar
0votes
1answer
2kviews

How can I check if my second hand Apple wireless keyboard contains a keylogger?

I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
Ana-Maria's user avatar
4votes
1answer
179views

Is Apple compromising network security with its default settings, which allow users to provide network credentials to other users with one tap?

This article summarizes the functionality that has been recently added to Apple devices. My colleagues have expressed concerns about this feature eroding network security at the office. My ...
Steven Lu's user avatar

close