{"id":40921,"date":"2021-05-17T14:25:50","date_gmt":"2021-05-17T14:25:50","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32291\/How-Apples-AirTag-Turns-Us-Into-Unwitting-Spies.html"},"modified":"2021-05-17T14:25:50","modified_gmt":"2021-05-17T14:25:50","slug":"how-apples-airtag-turns-us-into-unwitting-spies","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/","title":{"rendered":"How Apple&#8217;s AirTag Turns Us Into Unwitting Spies"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"css-1yqigsj\">Apple has launched the latest version of its operating system, iOS 14.5, which features the much-anticipated app tracking transparency function, bolstering the tech giant\u2019s privacy credentials.<\/p>\n<p class=\"css-1yqigsj\">But iOS 14.5 also introduced support for the new <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/apr\/20\/apple-launches-new-imac-and-ipad-pro\" data-link-name=\"in body link\">Apple AirTag<\/a>, which risks doing the opposite.<\/p>\n<p class=\"css-1yqigsj\">For the uninitiated, an AirTag is a small device (similar to a Tile) that can be attached to personal items such as keys, wallets or luggage. The tag periodically sends messages that can be used to track its location, letting you find any lost or missing items with the help of an app.<\/p>\n<p class=\"css-1yqigsj\">While clearly useful, AirTags can also potentially be misused. Concerns have been raised they might facilitate stalking, for example.<\/p>\n<figure id=\"5315a9e8-4711-4919-9590-3a62f27342d9\" class=\"css-1mfia18\"><\/figure>\n<p class=\"css-1yqigsj\">And there\u2019s also a more fundamental problem with this technology. Its euphemistic description as a \u201ccrowdsourced\u201d way to recover lost items belies the reality of how these items are tracked.<\/p>\n<p class=\"css-1yqigsj\">What you won\u2019t find highlighted in the polished marketing statements is the fact that AirTags can only work by tapping into an Apple-operated surveillance network in which millions of us are unwitting participants.<\/p>\n<h2 class>So, how exactly do AirTags work?<\/h2>\n<p class=\"css-1yqigsj\">AirTags are small, circular metal discs, slightly larger and thicker than an Australian one-dollar coin. Once paired with your Apple ID, the tag\u2019s location will be shown in the Find My app, whenever location data are available.<\/p>\n<p class=\"css-1yqigsj\">Each tag transmits a unique identifier using <a href=\"https:\/\/www.theguardian.com\/technology\/bluetooth\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">Bluetooth<\/a>. Any compatible Apple device within range (up to 100 metres in ideal conditions) will then relay that identifier to Apple\u2019s servers, along with its own location data. The tag\u2019s owner can then log on to the Find My app and access those location details, and bingo \u2013 you now have a pretty good idea of where your lost bag is.<\/p>\n<p class=\"css-1yqigsj\">The AirTags themselves have no positional location capability \u2013 they do not contain GPS technology. Rather, they \u201cping\u201d the nearest Bluetooth-enabled device and let that device\u2019s location data do the rest.<\/p>\n<p class=\"css-1yqigsj\">Besides Bluetooth, AirTags also use a relatively new technology called Ultra Wideband. This feature is supported only by later Apple devices such as iPhone 11 and 12, and allows for much more precise location tracking.<\/p>\n<p class=\"css-1yqigsj\">This precision extends to directional finding \u2013 now your phone can literally point you towards the missing tag.<\/p>\n<p class=\"css-1yqigsj\">While the actual nature of the data transmitted is not too concerning (tag ID and location), what makes it worrying is the sheer scale and number of devices involved. By using an AirTag, you are effectively availing yourself of a global monitoring network containing millions and millions of devices.<\/p>\n<p class=\"css-1yqigsj\">Everyone\u2019s iPhone (assuming Bluetooth is enabled) is listening for AirTags. When it \u201chears\u201d one, it uploads details of that tag\u2019s identifier and the phone\u2019s location to Apple\u2019s servers.<\/p>\n<p class=\"css-1yqigsj\">Besides any privacy concerns, this is also likely to use small amounts of your data allowance. That\u2019s probably fine most of the time, but if you are travelling internationally you might be hit with unexpected charges if you\u2019ve forgotten to disable data roaming.<\/p>\n<h2 class>Stalking technology?<\/h2>\n<p class=\"css-1yqigsj\">Apple says it has implemented a range of safeguards to detect and prevent attempts to use AirTags for stalking, including an alert triggered when an AirTag seems to be accompanying someone who\u2019s not its owner. The alert can appear on the victim\u2019s phone (if they use an iPhone) but can also raise an audible alert on the tag itself. But these measures are relatively easy to circumvent.<\/p>\n<p class=\"css-1yqigsj\">One experiment showed a tag can be placed on a person and would not trigger any of the safeguards if reconnected to the stalker\u2019s device regularly enough. This could be done by the victim returning home or within range of their stalker within a three-day window.<\/p>\n<p class=\"css-1yqigsj\">More concerningly, the alerts can be turned off \u2013 which a victim of domestic violence may be coerced into doing by their aggressor. What\u2019s more, as AirTags and similar devices become more common, we will inevitably encounter more warnings of tags appearing around us. Just like other commonly encountered alerts, many users will tire of seeing them and dismiss the prompts.<\/p>\n<figure class=\"css-10khgmf\"><\/figure>\n<p class=\"css-1yqigsj\">It is also presumably only a matter of time until these devices are hacked and put to other nefarious purposes.<\/p>\n<figure class=\"css-10khgmf\"><\/figure>\n<p class=\"css-1yqigsj\">Apple isn\u2019t the only technology company drawing unwitting users into large networks. Amazon\u2019s Sidewalk creates a network that allows your neighbours\u2019 doorbell to connect through your Echo device (if their wifi doesn\u2019t extend to the front door), effectively sharing your internet connection!<\/p>\n<figure class=\"css-10khgmf\">\n<div>\n<div class=\"css-eg3oz7\" readability=\"5.7473684210526\">\n<blockquote class=\"twitter-tweet\" readability=\"5.7473684210526\">\n<p lang=\"en\" dir=\"ltr\">Amazon Sidewalk could help extend the reach of your Wi-Fi, but the company&#8217;s data-collection habits may outweigh the feature&#8217;s benefits. <a href=\"https:\/\/t.co\/gcCKqLJDFy\">https:\/\/t.co\/gcCKqLJDFy<\/a><\/p>\n<p>\u2014 WIRED (@WIRED) <a href=\"https:\/\/twitter.com\/WIRED\/status\/1391133572396994562?ref_src=twsrc%5Etfw\">May 8, 2021<\/a><\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/figure>\n<p class=\"css-1yqigsj\">All of this functionality (and the inherent privacy risks) are covered in the standard terms and conditions. That lengthy, legalese document we never read allows tech companies to hide behind the claim that we have willingly opted into all this.<\/p>\n<h2 class>Can we opt out?<\/h2>\n<p class=\"css-1yqigsj\">A simple option to avoid your device acting as a cog in Apple\u2019s machine is to turn off Bluetooth and location services. With Bluetooth disabled, your device won\u2019t \u201csee\u201d the beacons coming from AirTags, and without location services you can\u2019t report the proximity of the tag.<\/p>\n<p class=\"css-1yqigsj\">Of course, turning off this functionality means losing useful capabilities such as hands-free kits, Bluetooth speakers and satellite navigation, and of course makes it harder to find your phone if you lose it.<\/p>\n<p class=\"css-1yqigsj\">Ultimately, if we want to benefit from the ability to locate missing keys, wallets and luggage through AirTags, we have to accept that this is only possible through a global network of sensors \u2013 even if those sensors are our own phones.<\/p>\n<p class=\"css-1yqigsj\"><span data-dcr-style=\"bullet\"><\/span> This article was first published on <a href=\"https:\/\/theconversation.com\/au\" data-link-name=\"in body link\">the Conversation<\/a>. Paul Haskell-Dowland is associate dean in computing and security at Edith Cowan University<\/p>\n<figure id=\"325d79be-be0f-4804-b286-652e380e6e9c\" class=\"css-10khgmf\"><\/figure>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32291\/How-Apples-AirTag-Turns-Us-Into-Unwitting-Spies.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9376],"class_list":["post-40921","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineprivacyspywareapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Apple&#039;s AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Apple&#039;s AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T14:25:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Apple&#8217;s AirTag Turns Us Into Unwitting Spies\",\"datePublished\":\"2021-05-17T14:25:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/\"},\"wordCount\":970,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/acf66cada09365b332597d28215f265823fff9ea\\\/0_88_3540_2125\\\/master\\\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\",\"keywords\":[\"headline,privacy,spyware,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/\",\"name\":\"How Apple's AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/acf66cada09365b332597d28215f265823fff9ea\\\/0_88_3540_2125\\\/master\\\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\",\"datePublished\":\"2021-05-17T14:25:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/acf66cada09365b332597d28215f265823fff9ea\\\/0_88_3540_2125\\\/master\\\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/acf66cada09365b332597d28215f265823fff9ea\\\/0_88_3540_2125\\\/master\\\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-apples-airtag-turns-us-into-unwitting-spies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,spyware,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyspywareapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Apple&#8217;s AirTag Turns Us Into Unwitting Spies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Apple's AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/","og_locale":"en_US","og_type":"article","og_title":"How Apple's AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-17T14:25:50+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Apple&#8217;s AirTag Turns Us Into Unwitting Spies","datePublished":"2021-05-17T14:25:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/"},"wordCount":970,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d","keywords":["headline,privacy,spyware,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/","url":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/","name":"How Apple's AirTag Turns Us Into Unwitting Spies 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d","datePublished":"2021-05-17T14:25:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/acf66cada09365b332597d28215f265823fff9ea\/0_88_3540_2125\/master\/3540.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=86cb2e0ad21d5215de207d9dd1aa099d"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-apples-airtag-turns-us-into-unwitting-spies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,spyware,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyspywareapple\/"},{"@type":"ListItem","position":3,"name":"How Apple&#8217;s AirTag Turns Us Into Unwitting Spies"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40921"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40921\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}