Apple AirTag
From Wiki-IoT
Classification
| Apple AirTag | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2021-06-21 |
| Information | |
| Name | AirTag |
| Brand by Parent | Apple by Apple Inc. |
| Generation | 1 |
| Model(s) | A1890, A2056 |
| Release date | 2021-04-30 |
| Type/Category | Bluetooth Tracker |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | Diameter: 1.26 in (31.9 mm), Thickness: 0.31 in (8.0 mm) Mass |
| Mass | 0.39 oz (11 grams) |
| Operating system | Proprietary Embedded OS |
| Companion App | Find My (iOS/iPadOS) |
| CPU | Apple-designed silicon (e.g., U1 chip) |
| GPU | N/A |
| Memory | Integrated RAM (amount undisclosed) |
| Storage | Integrated Flash (amount undisclosed) |
| Battery | User-replaceable CR2032 coin cell |
| Power | 3V DC |
| Charging | N/A |
| Display | N/A |
| Camera | N/A |
| Sound | Integrated speaker |
| Connectivity | Bluetooth 5.0, NFC, Ultra Wideband (UWB) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Difficult to tamper with without destruction; built-in tamper detection. |
| Known vulnerabilities | None | [3] | Research has identified potential tracking, but no major exploitable device flaws. |
| Prior attacks | None | [4] | Misuse for stalking reported; Apple has implemented anti-stalking features. |
| Updatability | Very common | [5] | Firmware is updated Over-the-Air (OTA) automatically via connected iPhone. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Secure integration with the Find My network and third-party accessories. |
| Communications | Encrypted with up-to-date encryption | [7] | End-to-end encryption for location data; rotating Bluetooth identifiers. |
| Storage | Encrypted with up-to-date encryption | [8] | All identifying data is encrypted on the device and in the cloud. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Managed via Apple ID; can be transferred between users; lost mode. |
| Authentication | Secure | [10] | Tied to Apple ID, which supports strong passwords and 2FA. |
| Brute-force protection | Exist | [11] | Physical pairing process required; no remote attack surface for brute-forcing. |
| Event logging | Access event logged | [12] | Logs when an unknown AirTag is found moving with you. |
| Passwords | Require change after setup with complexity requirements | [13] | Uses Apple ID, which has strong, ongoing password complexity requirements. |
| Category score | 1 | ||
| Grade | A |
|---|