- China claims to have cracked AirDrop encryption, enabling them to identify senders of messages
- Method allegedly involves decrypting device logs to uncover identifiers of those distributing content
- Highlights activists’ use of AirDrop and Apple’s balancing of restrictions in China amid government pressure
China has announced a concerning new development in its surveillance capabilities. The Beijing government claims that a state-backed institution has found a way to identify users sending messages through Apple‘s AirDrop file-sharing feature. This cracking of AirDrop’s encryption provides the ability to obtain senders’ phone numbers and email addresses.
How China Cracked AirDrop
According to Beijing’s judicial bureau, the method involves decrypting an iPhone’s device log to uncover the identifiers of those distributing content via AirDrop. Police say they have already identified multiple suspects through this technique. The bureau states that this improves efficiency in solving cases and prevents the spread of “inappropriate remarks” and “bad influences.”
AirDrop’s Use by Activists
The news highlights how activists globally have utilized AirDrop to share information. During the 2019 Hong Kong protests, demonstrators frequently used the feature to spread pro-democracy messages. AirDrop requires only nearby Bluetooth connectivity, making it a decentralized and difficult-to-control medium.
Apple’s Response
An Apple spokesperson has not yet provided comment on Beijing’s claims. The company faces escalating pressure in China, including new bans on using foreign tech products in state agencies. Apple must carefully balance restrictions on content with maintaining sales and operation in one of its largest markets.
Prior Limitations on AirDrop
This is not the first limitation Apple has placed on AirDrop in China. Since 2022, the company has restricted the file-sharing feature on Chinese iPhones after its use by protesters. The crackdown shows the determination of the Chinese government to stamp out any remaining loopholes in controlling information. With this purported technological advance, authorities now have an additional potent tool for identifying and potentially prosecuting activists and dissidents.