Richi Jennings<p>It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs.</p><p>Academic researchers discovered a vuln chain in Apple’s <a href="https://vmst.io/tags/FindMy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMy</span></a>’ network. Dubbed <a href="https://vmst.io/tags/nRootTag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nRootTag</span></a>, it allows hackers to track any Bluetooth device without the owner’s knowledge.</p><p>Breaking news: <a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> has finally begun to partially patch the flaws, but only in *some* OS versions. Researchers warn a full fix “will take years,” in part because you can’t update the <a href="https://vmst.io/tags/AirTag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AirTag</span></a>s themselves. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we disable dental protocols. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/02/nroottag-apple-find-my-richixbw/?utm_source=richisoc&utm_medium=social&utm_content=richisoc&utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/02/</span><span class="invisible">nroottag-apple-find-my-richixbw/?utm_source=richisoc&utm_medium=social&utm_content=richisoc&utm_campaign=richisoc</span></a> <a href="https://vmst.io/tags/AAPL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AAPL</span></a></p>