![]() |
Originally Posted by GUWonder
(Post 35110230)
Many of my AirTags and TilePro tags are on key rings without any keys on them. And for my luggage games, I put the trackers in with key rings that have no keys on them. I suspect that I’ve got plenty of company that have the trackers tied to key rings without keys. And the FTer who got the truck back said “key ring” rather than “keys”.
|
Was wondering, if a Samsung phone connects to a plane's WiFi, would these track, while say, you're over the ocean?
|
Originally Posted by MSerforfun
(Post 35115677)
Was wondering, if a Samsung phone connects to a plane's WiFi, would these track, while say, you're over the ocean?
what I’m not certain about is if the https conduit that airtags use or the IOS device uses to SEND the data over the internet to apple is in the subnet or the unrestricted HTTP/S path that certain airline carriers have OPEN and that don’t require a purchased internet package while in flight. |
Originally Posted by nmenaker
(Post 35115755)
what I’m not certain about is if the https conduit that airtags use or the IOS device uses to SEND the data over the internet to apple is in the subnet or the unrestricted HTTP/S path that certain airline carriers have OPEN and that don’t require a purchased internet package while in flight.
|
Originally Posted by StuckInYYZ
(Post 35116076)
I see what you're getting at. I suspect it's likely not, there's no incentive for them for them to do so. Unless Apple paid them for this access, why would they allow data to anything other than their own sites and the service providers? They may allow some messaging apps, but this? I doubt it. But it'd be very hard to test.
If apple is using that protocol at least for the AirTags information transport, then its possible that when anyone on the plane with an IOS device has enabled the free messaging, that a proximate AirTags that sees their device, then this tag information could be sent out over the sat/internet encrypted messages pathway and ultimately update the apple AirTag server information in relative real-time |
Wells did anyone successfully try it? AirTag, Tile or SmartTag, just wondering, did it track while you had it in your luggage over the ocean?
|
Originally Posted by nmenaker
(Post 35116235)
Agree, I don’t see any incentive, but it could just be happening coincident. For example, with IOS Messages is the end to end secure encrypted channel that apple uses between IOS endpoints.. it MIGHT also be the conduit that apple uses to send the anonymous and most likely encrypted Airtag data.. For United as an example, one can activate FREE messaging over this protocol (it’s not SMS messaging but data messaging) without paying for Internet on a flight.
If apple is using that protocol at least for the AirTags information transport, then its possible that when anyone on the plane with an IOS device has enabled the free messaging, that a proximate AirTags that sees their device, then this tag information could be sent out over the sat/internet encrypted messages pathway and ultimately update the apple AirTag server information in relative real-time That said, I don't know how complicated it is with aircraft systems. On a standard network, it's not that difficult. |
Originally Posted by StuckInYYZ
(Post 35116385)
I find it hard to believe that they wouldn't see some of these loopholes and closing them.
That said, I don't know how complicated it is with aircraft systems. On a standard network, it's not that difficult. |
Originally Posted by nmenaker
(Post 35116409)
Voice VOIP (which is basically anything today) audio calls and video and audio streaming over VPN still works fine, they haven’t shut that down yet in over 10 years.
|
Originally Posted by StuckInYYZ
(Post 35116560)
Yes, but that's the whole point of a VPN. It encrypts and obfuscates data. Unless you have the key, you only know data is going to or coming from a proxy service. What that data is, you don't know. Where it going to or coming from is a total mystery. They could block known VPN servers, but that's a whack a mole game that requires constant playing.
they couldn’t really or wouldn’t really be able to try and figure out which VPN providers, or destination servers were being used for non-approved uses because there’s just no way to know which ones are being used for those purposes. They COULD make VPN use simply more painful for either VOIP audio streaming, Zoom streaming or other video/audio streaming by putting in some throughput interference or sequencers so legitimate approved VPN access like corporate mail or pst file download etc. would simply surge and fall, surge and fall and for the user appear relatively stable and intact.. but for an audio stream, let alone video, it would just stop or drop too many packets, or stutter and freeze, and for the user probably become so dissatisfactory as to avoid its use. Let’s hope they don’t read this stuff. |
Originally Posted by nmenaker
(Post 35116580)
It’s not really a game of whackamole, it’s a protocol (several actually, but defined) like any other, and the main destination VPN server IP ranges and destinations don’t change that often. But IF they blocked the VPN protocols they would also block all the legitimate and necessary uses of VPN while traveling for say business travelers and most likely actually LOSE many of those flyers, so they can’t and I think they won’t.
Originally Posted by nmenaker
(Post 35116580)
they couldn’t really or wouldn’t really be able to try and figure out which VPN providers, or destination servers were being used for non-approved uses because there’s just no way to know which ones are being used for those purposes.
Originally Posted by nmenaker
(Post 35116580)
They COULD make VPN use simply more painful for either VOIP audio streaming, Zoom streaming or other video/audio streaming by putting in some throughput interference or sequencers so legitimate approved VPN access like corporate mail or pst file download etc. would simply surge and fall, surge and fall and for the user appear relatively stable and intact.. but for an audio stream, let alone video, it would just stop or drop too many packets, or stutter and freeze, and for the user probably become so dissatisfactory as to avoid its use.
Let’s hope they don’t read this stuff. |
I am seeing a lot of smart finder tags being sold in Asia. Definitely Chinese products and says both IOS and Android. Not expensive either so wonder if anyone has tried any other products other than Tile? One was called Smart Finder. I use Air Tags and if there is a good android choice I will buy it.
|
Originally Posted by StuckInYYZ
(Post 35116385)
I haven't heard anything flattering about any airline IT department, however, it would be easy to block... you only allow https/443 (blocking all other ports) and set it to only direct only to a united or panasonic (as examples, I have no clue who their provider is) IP address/name. Quite likely they haven't configured the above example properly. Done smartly with a proper SIEM, they would likely see this kind of info (they might be collecting it and not managing it properly) and filter those out if they wanted to. I know some airlines offer messaging apps access free of charge, but considering how much they all whine about a lack of profit they're making, I find it hard to believe that they wouldn't see some of these loopholes and closing them.
That said, I don't know how complicated it is with aircraft systems. On a standard network, it's not that difficult. |
Originally Posted by jebr
(Post 35832651)
The bigger "issue" is that many airlines now have free/low-cost messaging access, at least once authenticating in their captive portal. If that messaging access includes iMessage, that access requires creating some rule to allow traffic to Apple's servers so that users can send and receive iMessages. Those same rules may be broad enough to also allow whatever system Apple uses to communicate location data for AirTags to function - after all, both are housed on Apple servers and use encrypted connections to them, and neither (presumably) requires a lot of bandwidth to function.
|
Originally Posted by Davvidd
(Post 35832610)
I am seeing a lot of smart finder tags being sold in Asia. Definitely Chinese products and says both IOS and Android. Not expensive either so wonder if anyone has tried any other products other than Tile? One was called Smart Finder. I use Air Tags and if there is a good android choice I will buy it.
Originally Posted by jebr
(Post 35832651)
The bigger "issue" is that many airlines now have free/low-cost messaging access, at least once authenticating in their captive portal. If that messaging access includes iMessage, that access requires creating some rule to allow traffic to Apple's servers so that users can send and receive iMessages. Those same rules may be broad enough to also allow whatever system Apple uses to communicate location data for AirTags to function - after all, both are housed on Apple servers and use encrypted connections to them, and neither (presumably) requires a lot of bandwidth to function.
|
| All times are GMT -6. The time now is 11:04 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.