Updated July 18, 2019
According to rumors, Apple has joined up with friends and research
Add your iPhone app to a new app called “My Search”. Apple tells us now
Click [Application and control devices
Even offline encryption. You will find new stuff in my app
Bluetooth notifications from nearby Apple devices without monitoring your device
Contact us on your mobile
When Craig Pedrig came up with the plan
And with his appearance at WWDC 2019, he says he uses the show
The encryption and anonymous mechanism only provide
You can track your device even if Apple can’t determine the location.
We will see
One possible conclusion is that you need MOS Office 13S FindMy
Apple has two devices. Other devices press the key
Locked the lost password and location of the device.
How do they work without control?
He also explained how the program complicates encryption.
Bluetooth dental signal is always in motion between two technicians
These signaling devices must select a variable key.
Encrypt and download your own from your nearest Apple device
Porting to Apple servers.
However, some local data can only be decrypted by your other devices, as there are only keys to encrypt them.
They like it
This is not entirely possible, since the universal key is often rotated.
Someone secretly sees the Bluetooth tooth signals and their location at the back.
For example, if someone stole your iPhone and put it in airplane mode.
IOS device constantly releases key to public rotation
Offer blue teeth. An OS device that is close to iOS or MacOS receives this signal
Transfer encrypted local data using the provided public key
The blue open tooth key does not contain personal items.
You can use the identifier to track the owner of the device.
The device closest to iPhone or MacOS will install the hidden location
He lost the public key of his iPhone. Because he only has one weapon
No one can keep track of the private key to clearing up the situation
The other device has a public key that does not match your key
Unlock the iPhone key as they rotate constantly. No apples
Explain how this works, but above
Public keys are encrypted and use the Apple algorithm
Drag the previous item to the lost device.
It is hard
A car, but if Apple successfully removed it, well
A great way to keep track of where special resources are available during security
The user password is not damaged.