{"id":52200,"date":"2025-02-27T04:28:15","date_gmt":"2025-02-27T03:28:15","guid":{"rendered":"https:\/\/www.apfelpatient.de\/?p=52200"},"modified":"2025-02-27T04:28:19","modified_gmt":"2025-02-27T03:28:19","slug":"hackers-use-apple-feature-to-leave-bluetooth-devices-unprotected","status":"publish","type":"post","link":"https:\/\/www.apfelpatient.de\/en\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt","title":{"rendered":"Hackers exploit Apple feature: Bluetooth devices unprotected"},"content":{"rendered":"<p class=\"has-drop-cap\"><strong>Apple has been touting high security standards and data protection policies for years. But a new exploit in the &quot;Find My Network&quot; shows that even Apple systems are not invulnerable. Researchers at George Mason University have discovered a vulnerability that allows hackers to track any Bluetooth device unnoticed. This means that smartphones, laptops or even game consoles can be turned into a kind of AirTag without the owner&#039;s consent.<\/strong><\/p>\n\n\n\n<p>The Find My Network is a handy feature for Apple users. It helps to find lost or stolen devices by using a decentralized location system. Devices like AirTags send out Bluetooth signals that are received by other Apple devices nearby. These then transmit the location anonymously to the Apple server, where the owner can retrieve it. However, this system can be abused. Researchers <a href=\"https:\/\/cec.gmu.edu\/news\/2025-02\/find-my-hacker-how-apples-network-can-be-potential-tracking-tool\" target=\"_blank\" rel=\"noreferrer noopener\">have<\/a> discovered that any Bluetooth device can be manipulated to behave like an AirTag, making it possible for hackers to locate a device and track its movements without the owner&#039;s knowledge.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-der-exploit-so-funktioniert-der-angriff\">The exploit: How the attack works<\/h4>\n\n\n\n<p>The vulnerability is based on the fact that Apple devices rely on certain Bluetooth keys to identify a device in the Find My network. Hackers have now found a way to calculate these keys. This is done using a system called nRootTag. The researchers used hundreds of graphics processing units (GPUs) to decrypt matching Bluetooth keys. Once they have found the right key, they can impersonate any Bluetooth device as an AirTag and use it to track its location remotely. The attack has a success rate of 90% and does not require advanced administrator rights. This means that even less experienced hackers would be able to exploit this exploit. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-beunruhigende-erkenntnisse-hacker-konnen-ganze-routen-nachverfolgen\">Disturbing findings: Hackers can track entire routes<\/h4>\n\n\n\n<p>In tests, the research team was able to track various devices with high precision. A laptop could be located with an accuracy of three meters. In another experiment, a bicycle could be tracked through a city. Particularly worrying was the attempt to track a game console during a flight, which made it possible to reconstruct the passenger&#039;s entire route. But the potential risks go even further. Smart locks or other security-relevant devices could also be affected. For example, if an attacker knows where an electronic door lock is located, this could endanger the security of residential or commercial premises.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-apples-reaktion-und-die-anhaltende-gefahr\">Apple&#039;s reaction and the ongoing danger<\/h4>\n\n\n\n<p>The researchers informed Apple about the vulnerability in July 2024 and recommended improving Bluetooth authentication in the Find My Network. Apple has officially acknowledged the discovery, but there is currently no solution to the problem. A major obstacle is that many users do not update their devices regularly. So even if Apple releases an update, the vulnerability will potentially remain usable for years.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-so-kannst-du-dich-schutzen\">How you can protect yourself<\/h4>\n\n\n\n<p>Although Apple has not yet provided a solution, there are some steps you can take to better protect your device:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restrict Bluetooth access: Grant apps Bluetooth access only when absolutely necessary.<\/li>\n\n\n\n<li>Install software updates: As soon as Apple releases a security update, you should install it immediately.<\/li>\n\n\n\n<li>Disable unnecessary Bluetooth connections: Turn off Bluetooth when you don&#039;t need it, especially in public areas.<\/li>\n\n\n\n<li>Check for unknown devices in Find My: If you see an unknown device, you should be suspicious.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-missbrauch-von-apple-s-find-my-network-ein-problem-ohne-schnelle-losung\">Abuse of Apple&#039;s Find My Network: A problem with no quick solution<\/h3>\n\n\n\n<p>The nRootTag exploit shows that even well-designed security features like the Find My Network can be abused. The ability to track any Bluetooth device poses a serious risk to privacy. Until Apple finds a solution, it is up to users to be careful with Bluetooth permissions and update their devices regularly. As long as the vulnerability exists, hackers could exploit Bluetooth devices for unnoticed tracking - and that is a massive privacy problem. (Image: Apple)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/iphone-16e-for-699-euros-is-it-really-worth-its-price\">iPhone 16e for 699 euros: Is it really worth the price?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ios-18-4-brings-controversial-change-in-safari-that-changes\">iOS 18.4 brings controversial change to Safari \u2013 this is what is changing<\/a><\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-kennt-ihr-schon-unsere-amazon-storefront-dort-findet-ihr-eine-handverlesene-auswahl-von-diversen-produkten-f-r-euer-iphone-und-co-viel-spa-beim-st-bern\"><em>Have you already visited our Amazon Storefront? There you&#039;ll find a hand-picked selection of various products for your iPhone and other devices \u2013 <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" class=\"ek-link\" data-wpel-link=\"exclude\" rel=\"follow noopener\" target=\"_self\"><span style=\"text-decoration: underline\" class=\"ek-underline\">enjoy browsing<\/span><\/a> !<\/span><\/em><\/h6>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-der-beitrag-enthalt-partnerlinks\">This post contains <a data-type=\"URL\" data-id=\"https:\/\/www.apfelpatient.de\/partnerprogramm\" href=\"https:\/\/www.apfelpatient.de\/en\/partner-program\" data-wpel-link=\"internal\" target=\"_self\">affiliate links<\/a>.<\/h6>","protected":false},"excerpt":{"rendered":"<p>New vulnerability in Apple&#039;s Find My Network: Every Bluetooth device can become a tracker. Find out how hackers exploit the system!<\/p>","protected":false},"author":2,"featured_media":52199,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"format":"standard","override":[{"template":"2","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","post_calculate_word_method":"str_word_count","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post_position":"meta","trending_post_label":"Trending","sponsored_post_label":"Sponsored by","disable_ad":"0"},"jnews_primary_category":{"id":"9"},"footnotes":""},"categories":[9],"tags":[34],"class_list":["post-52200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-apple-dienste"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt Apfelpatient<\/title>\n<meta name=\"description\" content=\"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apfelpatient.de\/en\/news\/hackers-use-apple-feature-to-leave-bluetooth-devices-unprotected\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt\" \/>\n<meta property=\"og:description\" content=\"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apfelpatient.de\/en\/news\/hackers-use-apple-feature-to-leave-bluetooth-devices-unprotected\" \/>\n<meta property=\"og:site_name\" content=\"Apfelpatient\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T03:28:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-27T03:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt\"},\"author\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"headline\":\"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt\",\"datePublished\":\"2025-02-27T03:28:15+00:00\",\"dateModified\":\"2025-02-27T03:28:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt\"},\"wordCount\":691,\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Wo-ist-App-1.jpeg\",\"keywords\":[\"Apple Dienste\"],\"articleSection\":\"News\",\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt\",\"name\":\"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt Apfelpatient\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Wo-ist-App-1.jpeg\",\"datePublished\":\"2025-02-27T03:28:15+00:00\",\"dateModified\":\"2025-02-27T03:28:19+00:00\",\"description\":\"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Wo-ist-App-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Wo-ist-App-1.jpeg\",\"width\":1600,\"height\":1067,\"caption\":\"Bild: Apple\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.apfelpatient.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/\",\"name\":\"Apfelpatient\",\"description\":\"Alles rund um Apple!\",\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"alternateName\":\"Apfelpatient\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apfelpatient.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/35b3ddba5832f2bfc7fff5206d4f6b7b\",\"name\":\"Milan\",\"logo\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/image\\\/\"},\"description\":\"Hallo und herzlich willkommen auf meinem Technik-Blog! Als gro\u00dfer Apple-Fan berichte ich hier \u00fcber alles, was mit Apple zu tun hat: von den neuesten News und spannenden Ger\u00fcchten \u00fcber hilfreiche Tipps und Tricks bis hin zu ausf\u00fchrlichen Produkttests. Wenn du genauso technikbegeistert bist wie ich, bist du hier genau richtig!\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apfelpatientOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milan-jovicic-42aa0231b\"],\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/author\\\/apfeladmin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers exploit Apple feature: Bluetooth devices unprotected Apfelpatient","description":"New vulnerability in Apple&#039;s Find My Network: Every Bluetooth device can become a tracker. Find out how hackers exploit the system!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apfelpatient.de\/en\/news\/hackers-use-apple-feature-to-leave-bluetooth-devices-unprotected","og_locale":"en_US","og_type":"article","og_title":"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt","og_description":"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!","og_url":"https:\/\/www.apfelpatient.de\/en\/news\/hackers-use-apple-feature-to-leave-bluetooth-devices-unprotected","og_site_name":"Apfelpatient","article_publisher":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_author":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_published_time":"2025-02-27T03:28:15+00:00","article_modified_time":"2025-02-27T03:28:19+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg","type":"image\/jpeg"}],"author":"Milan","twitter_card":"summary_large_image","twitter_description":"Neue Schwachstelle in Apples Find My Network: Jedes Bluetooth-Ger\u00e4t kann zum Tracker werden. Erfahre, wie Hacker das System ausnutzen!","twitter_misc":{"Written by":"Milan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#article","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt"},"author":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"headline":"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt","datePublished":"2025-02-27T03:28:15+00:00","dateModified":"2025-02-27T03:28:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt"},"wordCount":691,"publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg","keywords":["Apple Dienste"],"articleSection":"News","inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.apfelpatient.de\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt","url":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt","name":"Hackers exploit Apple feature: Bluetooth devices unprotected Apfelpatient","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg","datePublished":"2025-02-27T03:28:15+00:00","dateModified":"2025-02-27T03:28:19+00:00","description":"New vulnerability in Apple&#039;s Find My Network: Every Bluetooth device can become a tracker. Find out how hackers exploit the system!","breadcrumb":{"@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#primaryimage","url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg","contentUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2025\/02\/Wo-ist-App-1.jpeg","width":1600,"height":1067,"caption":"Bild: Apple"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apfelpatient.de\/news\/hacker-nutzen-apple-feature-aus-bluetooth-geraete-ungeschuetzt#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.apfelpatient.de\/"},{"@type":"ListItem","position":2,"name":"Hacker nutzen Apple-Feature aus: Bluetooth-Ger\u00e4te ungesch\u00fctzt"}]},{"@type":"WebSite","@id":"https:\/\/www.apfelpatient.de\/#website","url":"https:\/\/www.apfelpatient.de\/","name":"apple patient","description":"Everything about Apple!","publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"alternateName":"Apfelpatient","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apfelpatient.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/35b3ddba5832f2bfc7fff5206d4f6b7b","name":"Milan","logo":{"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/image\/"},"description":"Hello and welcome to my technology blog! As a big Apple fan, I report on everything to do with Apple: from the latest news and exciting rumors to helpful tips and tricks and detailed product tests. If you are as enthusiastic about technology as I am, you have come to the right place!","sameAs":["https:\/\/www.facebook.com\/apfelpatientOfficial","https:\/\/www.linkedin.com\/in\/milan-jovicic-42aa0231b"],"url":"https:\/\/www.apfelpatient.de\/en\/author\/apfeladmin"}]}},"_links":{"self":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/52200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/comments?post=52200"}],"version-history":[{"count":0,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/52200\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media\/52199"}],"wp:attachment":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media?parent=52200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/categories?post=52200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/tags?post=52200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}