This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:


reputable news agency


China says state-backed experts crack Apple's AirDrop

There were widespread reports in late 2022 that people in China were using AirDrop to spread digital leaflets critical of the government
There were widespread reports in late 2022 that people in China were using AirDrop to spread digital leaflets critical of the government.

Chinese state-backed experts have found a way to identify people who use Apple's encrypted AirDrop messaging service, according to the Beijing municipal government.

AirDrop allows users to send content to Apple devices in without an , encoded so they cannot be viewed by other people.

The service was widely used by participants in pro-democracy protests in Hong Kong in 2019 that China's central government eventually quelled.

Apple also limited file-sharing for Chinese iPhone users in 2022 following protests against the ruling Communist Party's stringent zero-COVID policy.

The Beijing 's justice bureau said experts at the Beijing Wangshen Dongjian Justice Appraisal Institute in the capital had devised a way to reveal an iPhone's encrypted device log.

From there, they could identify an AirDrop user's phone number and email accounts, the Monday statement on the bureau's website said.

It said the technique "cracked the tough technological problem of the transmission of inappropriate information with anonymous traceability via AirDrop".

The method also "raised the efficacy and accuracy of case detection and resolution, and has effectively helped police ascertain several case suspects".

The statement did not mention whether the technique had led to any arrests or convictions.

Apple did not immediately respond to a request for comment from AFP.

Protest leaflets

There were widespread reports in late 2022 that people in China were using AirDrop to spread digital leaflets critical of the government.

The transmissions were believed to be partly inspired by a protest in Beijing in which a man hung banners calling for the removal of President Xi Jinping.

In November of that year, Apple released an AirDrop update that meant users of Apple smartphones in China could only opt-in to receive files from unknown contacts during a 10-minute window before it automatically shuts off. The feature did not previously have a .

The update made it virtually impossible to receive unexpected files from strangers.

Chinese authorities have for years used extensive digital surveillance methods to silence dissent, with most domestic social media apps requiring users to register using their real names.

People must provide proof of identification to purchase SIM cards or install home broadband connections.

Platforms such as Weibo employ thousands of and automatically block politically sensitive keywords, such as tennis star Peng Shuai's name after she accused a senior politician of sexual assault in 2021.

Apple has long faced criticism for making perceived concessions to Xi's increasingly repressive China.

The company in 2019 removed a Hong Kong map application used by pro-democracy protesters, saying it endangered police, after China warned the tech giant to drop the app.

Apple CEO Tim Cook defended the move at the time, saying the firm had received "credible information" that the app was being used to target individual police officers.

In 2020, Beijing imposed a sweeping national security law on Hong Kong that has all but quashed public dissent in the former British colony.

© 2024 AFP

Citation: China says state-backed experts crack Apple's AirDrop (2024, January 10) retrieved 25 April 2024 from
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Apple limits file-sharing for Chinese iPhone users after anti-govt protest


Feedback to editors