AirDrop security (2024)

AirDrop security (1)

Apple devices that support AirDrop use Bluetooth Low Energy (BLE) and Apple-created peer-to-peer Wi-Fi technology to send files and information to nearby devices, including AirDrop-capable iOS devices and iPad devices with iOS 7 or later and Mac computers with OS X 10.11 or later. The Wi-Fi radio is used to communicate directly between devices without using any internet connection or wireless access point (AP). This connection is encrypted with TLS.

AirDrop is set to share with Contacts Only by default. Users can also choose to use AirDrop to share with everyone, or turn off the feature entirely. Organisations can restrict the use of AirDrop for devices or apps being managed by using a mobile device management (MDM) solution.

AirDrop operation

AirDrop uses iCloud services to help users authenticate. When a user signs in to iCloud, a 2048-bit RSA identity is stored on the device, and when the user turns on AirDrop, an AirDrop short identity hash is created based on the email addresses and phone numbers associated with the user’s Apple ID.

When a user chooses AirDrop as the method for sharing an item, the sending device emits an AirDrop signal over BLE that includes the user’s AirDrop short identity hash. Other Apple devices that are awake, in close proximity and have AirDrop turned on detect the signal and respond using peer-to-peer Wi-Fi so that the sending device can discover the identity of any responding devices.

In Contacts Only mode, the received AirDrop short identity hash is compared with hashes of people in the receiving device’s Contacts app. If a match is found, the receiving device responds over peer-to-peer Wi-Fi with its identity information. If there is no match, the device doesn’t respond.

In Everyone mode, the same overall process is used. However, the receiving device responds even if there is no match in the device’s Contacts app.

The sending device then initiates an AirDrop connection using peer-to-peer Wi-Fi, using this connection to send a long identity hash to the receiving device. If the long identity hash matches the hash of a known person in the receiver’s Contacts, then the receiver responds with its long identity hashes.

If the hashes are verified, the recipient’s first name and photo (if present in Contacts) are displayed in the sender’s AirDrop share sheet. In iOS and iPadOS, they are shown in the “People” or “Devices” section. Devices that aren’t verified or authenticated are displayed in the sender’s AirDrop share sheet with a silhouette icon and the device’s name, as defined in Settings > General > About > Name. In iOS and iPadOS, they are placed in the “Other People” section of the AirDrop share sheet.

The sending user may then select who they want to share with. Upon user selection, the sending device initiates an encrypted (TLS) connection with the receiving device, which exchanges their iCloud identity certificates. The identity in the certificates is verified against each user’s Contacts app.

If the certificates are verified, the receiving user is asked to accept the incoming transfer from the identified user or device. If multiple recipients have been selected, this process is repeated for each destination.

AirDrop security (2024)
Top Articles
The Ultimate Guide to B2B Insurance Marketing
https://www.lazyportfolioetf.com/etf/ishares-core-sp-u-s-growth-etf-iusg/
Fat People Falling Gif
Wisconsin Women's Volleyball Team Leaked Pictures
The 10 Best Restaurants In Freiburg Germany
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Rek Funerals
35105N Sap 5 50 W Nit
Florida (FL) Powerball - Winning Numbers & Results
Fire Rescue 1 Login
[2024] How to watch Sound of Freedom on Hulu
Brenna Percy Reddit
2016 Hyundai Sonata Price, Value, Depreciation & Reviews | Kelley Blue Book
Nioh 2: Divine Gear [Hands-on Experience]
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Diesel Mechanic Jobs Near Me Hiring
Nene25 Sports
Gdp E124
Find Such That The Following Matrix Is Singular.
Star Wars: Héros de la Galaxie - le guide des meilleurs personnages en 2024 - Le Blog Allo Paradise
Puretalkusa.com/Amac
Ge-Tracker Bond
Cvs El Salido
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Kabob-House-Spokane Photos
Craigslist Hunting Land For Lease In Ga
Dtm Urban Dictionary
Harbor Freight Tax Exempt Portal
Franklin Villafuerte Osorio
Bfri Forum
Jambus - Definition, Beispiele, Merkmale, Wirkung
Ixlggusd
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Www Violationinfo Com Login New Orleans
Uhaul Park Merced
Kips Sunshine Kwik Lube
Atlantic Broadband Email Login Pronto
The Boogeyman Showtimes Near Surf Cinemas
Tds Wifi Outage
Letter of Credit: What It Is, Examples, and How One Is Used
Go Bananas Wareham Ma
Locate phone number
Executive Lounge - Alle Informationen zu der Lounge | reisetopia Basics
Avance Primary Care Morrisville
Sallisaw Bin Store
Valls family wants to build a hotel near Versailles Restaurant
Craigslist Binghamton Cars And Trucks By Owner
Trending mods at Kenshi Nexus
Scott Surratt Salary
O.c Craigslist
Vrca File Converter
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 6004

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.