All Questions
4 questions
3votes
1answer
208views
How does the Apple/Google Exposure Notification system prevent infected users from being identified?
Under Apple and Google's contact tracing scheme, Alice's device generates a daily random value (termed a Temporary Exposure Key or TEK in the Cryptography Specification). Every 10 minutes, a Rolling ...
1vote
1answer
2kviews
Apple bluetooth keyboard insecure connection?
From time to time, I see this dialog box pop up on my MacBook Pro screen. It typically happens as the computer wakes up from sleep. Magic keyboard is trying to connect using an unsecured Bluetooth ...
0votes
1answer
2kviews
How can I check if my second hand Apple wireless keyboard contains a keylogger?
I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
4votes
1answer
179views
Is Apple compromising network security with its default settings, which allow users to provide network credentials to other users with one tap?
This article summarizes the functionality that has been recently added to Apple devices. My colleagues have expressed concerns about this feature eroding network security at the office. My ...