Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Hyperscalers ate my next computer

      Hyperscalers ate my next computer

      8 May 2026
      Major African telco postpones mobile money listing

      Major African telco postpones mobile money listing

      8 May 2026
      Cabinet approves new permanent Sita board, ending years of turmoil - State IT Agency

      Cabinet approves new permanent Sita board, ending years of turmoil

      8 May 2026
      A 12-year-old competition case lands on Canal+'s desk - Altech Node

      A 12-year-old competition case lands on Canal+’s desk

      8 May 2026
      Why South Africa is Zoho's third-fastest-growing market - Andrew Bourne

      Why South Africa is Zoho’s third-fastest-growing market

      8 May 2026
    • World
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
      Taylor Swift trademarks her voice to fight AI fakes

      Taylor Swift trademarks her voice to fight AI fakes

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Safety, privacy concerns raised over Apple AirTags

    Safety, privacy concerns raised over Apple AirTags

    By The Conversation17 May 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Apple recently launched the latest version of its operating system, iOS 14.5, which features the much-anticipated app-tracking transparency function, bolstering the tech giant’s privacy credentials. But iOS 14.5 also introduced support for the new Apple AirTag, which risks doing the opposite.

    For the uninitiated, an AirTag is a small device that can be attached to personal items such as keys, wallets or luggage. The tag periodically sends messages that can be used to track its location, letting you find any lost or missing items with the help of an app.

    While clearly useful, AirTags can also potentially be misused. Concerns have been raised they might facilitate stalking, for example.

    While clearly useful, AirTags can also potentially be misused. Concerns have been raised they might facilitate stalking, for example

    And there’s also a more fundamental issue with this technology. Its euphemistic description as a “crowd-sourced” way to recover lost items belies the reality of how these items are tracked.

    What you won’t find highlighted in the polished marketing statements is the fact that AirTags can only work by tapping into an Apple-operated surveillance network in which millions of us are unwitting participants.

    AirTags are small, circular metal discs, slightly larger and thicker than a R5 coin. Once paired with your Apple ID, the tag’s location will be shown in the “Find My” app, whenever location data are available.

    Unique identifier

    Each tag transmits a unique identifier using Bluetooth. Any compatible Apple device within range (up to 100m in ideal conditions) will then relay that identifier to Apple’s servers, along with its own location data. The tag’s owner can then log onto the Find My app and access those location details, and bingo — you now have a pretty good idea of where your lost bag is.

    The AirTags themselves have no positional location capability – they do not contain GPS technology. Rather, they merely “ping” the nearest Bluetooth-enabled device and let that device’s location data do the rest.

    Besides Bluetooth, AirTags also use a relatively new technology called Ultra Wideband. This new feature is supported only by recent Apple devices such as iPhone 11 and 12, and allows for much more precise location tracking.

    This precision extends to directional finding – now your phone can literally point you towards the missing tag.
    While the actual nature of the data transmitted is not too concerning (tag ID and location), what makes it worrying is the sheer scale and number of devices involved. By using an AirTag, you are effectively availing yourself of a global monitoring network containing millions and millions of devices.

    Everyone’s iPhone (assuming Bluetooth is enabled) is listening for AirTags. When it “hears” one, it uploads details of that tag’s identifier and the phone’s location to Apple’s servers.

    Besides any privacy concerns, this also likely uses small amounts of your data allowance. That’s probably fine most of the time, but if you are travelling internationally you might be hit with unexpected charges if you’ve forgotten to disable data roaming.

    Apple says it has implemented a range of safeguards to detect and prevent attempts to use AirTags for stalking

    Apple says it has implemented a range of safeguards to detect and prevent attempts to use AirTags for stalking, including an alert triggered when an AirTag seems to be accompanying someone who’s not its owner. The alert can appear on the victim’s phone (if they use an iPhone) but can also raise an audible alert on the tag itself. But these measures are relatively easy to circumvent.

    One experiment showed a tag can be placed on a person and would not trigger any of the safeguards if reconnected to the stalker’s device regularly enough. This could be done by the victim returning home or within range of their stalker within a three-day window.

    Turned off

    More concerningly, the alerts can be turned off – which a victim of domestic violence may be coerced into doing by their aggressor. What’s more, as AirTags and similar devices become more common, we will inevitably encounter more warnings of tags appearing around us. Just like other commonly encountered alerts, many users will tire of seeing them, and dismiss the prompts.

    It is also presumably only a matter of time until these devices are hacked and put to other nefarious purposes.

    Apple isn’t the only technology company drawing unwitting users into large networks. Amazon’s SideWalk creates a network that allows your neighbours’ doorbell to connect through your Echo device (if their Wi-Fi doesn’t extend to the front door), effectively sharing your Internet connection!

    All of this functionality (and the inherent privacy risks) are covered in the standard terms and conditions. That lengthy, legalese document we never read allows tech companies to hide behind the claim that we have willingly opted into all this.

    A simple option to avoid your device acting as a cog in Apple’s machine is to turn off Bluetooth and location services. With Bluetooth disabled, your device won’t “see” the beacons coming from AirTags, and without location services you can’t report the proximity of the tag.

    Of course, turning off this functionality means losing useful capabilities such as hands-free kits, Bluetooth speakers and satellite navigation, and of course makes it harder to find your phone if you lose it.

    Ultimately, if we want to benefit from the ability to locate missing keys, wallets and luggage through AirTags, we have to accept that this is only possible through a global network of sensors – even if those sensors are our own phones.The Conversation

    • Written by Paul Haskell-Dowland, associate dean, computing and security, Edith Cowan University
    • This article is republished from The Conversation under a Creative Commons licence
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    AirTag Apple Apple AirTag top
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleRetailer CNA battles to avoid business rescue
    Next Article Huge Group offer for Adapt IT ‘unfair and unreasonable’: Nodus Capital

    Related Posts

    Hyperscalers ate my next computer

    Hyperscalers ate my next computer

    8 May 2026
    Alphabet closes in on Nvidia as world's most valuable company

    Alphabet closes in on Nvidia as world’s most valuable company

    6 May 2026
    More details about Apple's AI plans emerge

    More details about Apple’s AI plans emerge

    6 May 2026
    Company News
    Your databases are being watched - just not by you - Ascent Technology Johan Lambert

    Your databases are being watched – just not by you

    8 May 2026
    Hexion deploys 30 petabyte sovereign data archive in South Africa

    Hexion deploys 30 petabyte sovereign data archive in South Africa

    7 May 2026
    We're hiring: TechCentral is looking for technology journalists

    We’re hiring: TechCentral is looking for technology journalists

    6 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Hyperscalers ate my next computer

    Hyperscalers ate my next computer

    8 May 2026
    Major African telco postpones mobile money listing

    Major African telco postpones mobile money listing

    8 May 2026
    Cabinet approves new permanent Sita board, ending years of turmoil - State IT Agency

    Cabinet approves new permanent Sita board, ending years of turmoil

    8 May 2026
    Your databases are being watched - just not by you - Ascent Technology Johan Lambert

    Your databases are being watched – just not by you

    8 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}