<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Technical University of Darmstadt &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/technical-university-of-darmstadt/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 06 May 2021 07:45:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>IOS users should immediately turn off AirDrop</title>
		<link>https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 06 May 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hashing]]></category>
		<category><![CDATA[Ignored]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[USB C]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</guid>

					<description><![CDATA[User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch. According to the Mashable The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch.</strong><br />
<span id="more-11904"></span> According to the <em> Mashable</em> The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the Technical University of Darmstadt, have warned Apple about this dangerous vulnerability since May. 2019 but the company still ignored it. About 1.5 billion devices are still unpatched.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/6f599621b063593d0072.jpg" width="625" height="351"> <em> Hackers can obtain sensitive user&#8217;s information through the vulnerability in AirDrop. Photo: TU Darmstadt. </em> &#8220;An attacker could obtain a user&#8217;s phone number and email through AirDrop,&#8221; the team said. &#8220;They just need to use a device with Wi-Fi capable, reach the target at close range to start the mining process by opening the sharing feature on iOS or macOS device.&#8221; According to the <em> 9to5mac</em> There are two steps in the mechanism of AirDrop action leading to this critical vulnerability. First, in order to provide users with the option &#8220;Contacts Only&#8221; in the AirDrop sharing feature, Apple devices silently collect information on devices within the connection range. To see if the &#8220;other party&#8221; is in the contacts list, AirDrop uses a mutual authentication mechanism, comparing the user&#8217;s phone number and email address with the entries in the address book. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/07bce1c4c7862ed87797.jpg" width="625" height="351"> <em> The device authentication step in the directory can be exploited to get information. Photo: Monica Chin. </em> In the next step, data is exchanged for both parties. Despite encryption, Apple uses a relatively weak hashing mechanism. Security experts can decompile the hash using a simple technique like a brute-force attack. The team addressed the AirDrop vulnerability with a more secure approach, they named PrivateDrop. However, Apple did not move after being warned of the risk of personal information leaks and privacy breaches. In the immediate future, experts from the Technical University of Darmstadt advise users to protect themselves by disabling AirDrop discovery in the system settings and not opening the share menu. The detailed results of the study will be presented at the USENIX security Symposium taking place in August. <em> <strong> Why does iPhone not have USB-C port?</strong> </em> <em> In the past 5 years, USB-C has become the suitable connector for a wide variety of devices such as Android phones, laptops and tablets. However, Apple still doesn&#8217;t make iPhones with USB-C ports.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11904</post-id>	</item>
		<item>
		<title>Apple&#8217;s AirDrop feature isn&#8217;t safe</title>
		<link>https://en.spress.net/apples-airdrop-feature-isnt-safe/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Sun, 02 May 2021 23:45:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[Breaking down]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[isnt]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[OS X Yosemite]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Windows Phone]]></category>
		<guid isPermaLink="false">https://en.spress.net/apples-airdrop-feature-isnt-safe/</guid>

					<description><![CDATA[Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature. Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature. AirDrop is very useful for Apple ecosystem users but is being warned of being insecure. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature.</strong><br />
<span id="more-11163"></span> Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_5_38638799/a5daa9648e2667783e37.jpg" width="625" height="417"> <em> AirDrop is very useful for Apple ecosystem users but is being warned of being insecure.</em> Experts said, AirDrop allows users to share files with Apple devices in contacts. During the process of verifying the connection between devices, AirDrop uses a &#8220;mutual authentication mechanism&#8221; to compare the user&#8217;s phone number and email with the entries in the other device&#8217;s phonebook. Basically, data exchanged via AirDrop is encrypted by Apple, but this security mechanism is assessed by experts as relatively weak. In fact, Apple just scrambles the phone numbers and email addresses exchanged in the process of transmitting through AirDrop. This security mechanism can be easily circumvented using simple techniques like brute-force attacks. Also according to security experts at Technical University of Darmstadt (Germany), the above vulnerability was discovered in May 2019 and has been notified to Apple, but Apple still has no specific patch. to fix the problem. Airdrop is a feature that comes pre-installed on iPhone, iPad or Mac (depending on the version of the operating system). Helps iOS, Mac devices connect together and can easily share files wirelessly with each other very quickly without affecting the quality of the file. Airdrop has been integrated on iPhone, iPod, iPad devices using iOS 7 or higher. Macbook from 2012 with OS X Yosemite (10.0) higher (except Mac Pro mid-2012). In addition, AirDrop cannot be used with other operating systems (Android phones, Windows Phone phones &#8230;).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11163</post-id>	</item>
	</channel>
</rss>