Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another scenario, leave it in an isolated hut. If I get a signal, someone is close to the hut.

You could do that already with a device, just by making an app that listens for Bluetooth or WiFi traffic. You’d also be able to grab MAC addresses of the nearby phones. Your ‘exploit’ isn’t revealing any more than you can already discover today.




Except in the case of Find My you don't need any connectivity in the hut whatsoever.

If you build your own BT or WiFi sniffer, you won't be able to piggyback on someone else's internet connectivity.


If there’s internet connectivity, and you’re sophisticated enough to be planning Find My iPhone based booby traps, firing off a text message from a contained detector shouldn’t be a challenge




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: