
Privacy Analysis of Samsung’s Crowd-Sourced Bluetooth Location Tracking System Technical Report, 2023, ANU
updates. Samsung did conrm that they would not x the issue of de-
anonymisation through BLE DFU mode (see Section 5.1.3) as they
claimed it would interfere with their device rmware download
and update process at their repair centre. We have allowed ample
time for Samsung to address these issues, exceeding the industry
standard of 90-day embargo period, hence the publication of these
details.
Related work
We now provide a literature review on existing security and privacy
analysis of Samsung and Apple’s Bluetooth trackers, Oine Finding
(OF) networks, continuity protocols, and other relevant products
that implement Bluetooth technology.
Apple’s Oine Finding Network. The closest to our work is the
security and privacy analysis of Apple’s FindMy oine-nding net-
work by Heinrich, et. al. [
15
]. Their study uncovered two design and
implementation aws outside Apple’s adversary model that could
lead to location correlation attacks and unauthorized access to lo-
cation histories of the past week. They reverse-engineered FindMy
protocols and showed that one could create custom tracking devices
leveraging on the FindMy network through their OpenHaystack
framework.6
Samsung FMM App. Researchers at Char49 discovered several
vulnerabilities [
7
] in an earlier version of Samsung FMM app, al-
lowing, among others, a malicious app installed in the phone to
manipulate the URL endpoint accessed by the FMM app, and to ac-
cess unprotected broadcast receivers in the FMM app. This analysis
was done prior to the introduction of the oine-nding features to
FMM, so it did not cover the OF related vulnerabilities.
Hardware and rmware security of AirTags and SmartTags. Both
Apple AirTags and Samsung SmartTags are implemented using
the nRF52 series of System on Chips (SoC). The nRF52 series have
been used for a wide range of Internet of Things (IoT) devices; they
support a variety of wireless communication protocols, such as
Bluetooth LE and Bluetooth Mesh. However, the nRF52 series chips
are known to be vulnerable to power glitching attacks. AirTags use
the nRF52832 chip for BLE and Near Field Communication (NFC)
connectivity. Roth et. al. analysed the hardware and the rmware
security of AirTags, and documented AirTags’ communication pro-
tocols in detail [
19
]. The main rmware of the AirTag was extracted
through voltage glitching attacks on its nRF chip. By reprogram-
ming the rmware and changing the conguration data, they were
able to
•
modify the internal behavior of AirTags, including cloning
an AirTag, customizing the soundset of the AirTag, using
the AirTag’s accelerometer as microphone;
•
change the BLE and NFC behavior of AirTags which can
potentially be exploited for malicious purposes.
By instrumenting the iPhone-AirTag interface, they were also able
to unlock undocumented commands and features on AirTags over-
the-air without hardware modication.
Galaxy SmartTags use the Nordic nRF52833 chip. Luca Bongiorni
exploited a voltage fault injection vulnerability on the nRF52833
6https://github.com/seemoo-lab/openhaystack
chips to dump the rmware of SmartTags and released the dumped
rmware images and information related to the attack,
7
although
as far as we know the author did not attempt a reverse engineering
of the OF protocol for SmartTags.
Bluetooth trackers from other vendors. Apple and Samsung are
relatively newcomers when it comes to bluetooth tracking dvices.
There were already a number of bluetooth trackers in the market
prior to the introduction of AirTags and SmartTags, notably the
Tile tracker; see Weller et. al. [
21
] for a recent survey on these
trackers. Weller et. al. also presented a detailed analysis of the secu-
rity and privacy aspects of various commercial Bluetooth trackers,
including Nut, Smart Tracker, Tile, Musegear nder, iTrackEasy,
Cube Tracker, Keeper, iTracing, iSearching, and FindELFI, focusing
on the interactions of these nders, their associated mobile apps
and the backend cloud servers for crowdsourced location tracking.
However, they did not analyse the privacy issues arising from the
BLE protocols used in these trackers.
Anti-Tracking Technologies. Apple’s FindMy network consists of
hundreds of millions of active devices, which has raised a concern
on whether an attacker can abuse the network for malicious track-
ing. Apple has developed and implemented an in-built anti-tracking
framework, which would send users a safety alert if it is detected
that they have been followed by an unknown FindMy tracker.
In 2021, Mayberry et al. analysed the eectiveness of Apple’s
in-built anti-tracking mechanisms, then developed and conrmed
three techniques to defeat the mechanisms [
17
]. The rst technique
is Bit Flipping. The OF advertisement data of FindMy supported
devices follows a xed structure, where type of the device is stored
in byte 2 of the advertisement data. Mayberry et al. found that when
byte 2 is set to 0x00, which indicates that the device type is iPhone,
FindMy would not report the device as a tracker regardless of its
tracking period and distance. A legitimate FindMy device broadcasts
OF data containing a rolling key shared between the owner and the
device when it is away from the owner and performs MAC address
randomization and advertisement data rotation in-sync every 24
hours. The other two techniques are both based on frequent Key
Rotations to prevent anti-tracking algorithms from identifying a
tracker device based on the key. The dierence is that in the second
technique, a new key is selected from a large pre-generated set
of valid keys when rotating the advertisement data. In the last
technique, each new key is generated deterministically using the
rolling key generation algorithm used by FindMy devices. Mayberry
et al.’s study has shown that the iOS tracking detection is unable to
detect FindMy trackers with fast advertisement payload rotations
or mark devices broadcasting OF data in the lost iPhone format as
trackers. Therefore, an adversary can easily bypass Apple’s anti-
tracking mechanism by customizing a Bluetooth capable device
that implements either of the above techniques and track a target
without being detected.
AirGuard is an anti-tracking application designed and developed
by researchers from SEEMOO lab [
14
]. AirGuard is an open-sourced
Android application that was mainly designed to protect Android
users from BLE trackers that leverage on Apple’s OF network. The
experiment results show that AirGuard achieved a higher success
7https://github.com/whid-injector/Samsung-SmartTag-Hack
3