

Then, the stranger’s iPhone uploads two things to Apple’s server: First the encrypted location and secondly, a hash of the stolen iPhone’s public key, which will serve as an identifier. The public key rotates frequently and doesn’t contain any personal information so that stranger’s iPhone can’t link to the lost device its prior locations. Your phone will keep emitting and rotating its public key via Bluetooth.Ī nearby stranger’s iPhone will pick up the signal, check its own location, and encrypt that location data using the public key it picked up from the stolen iPhone.

Suppose, someone stole your iPhone and it’s now disconnected from the Internet.
FIND MY IPHONE OFFLINE LAST KNOWN LOCATION HOW TO
Though Apple doesn’t reveal how often the key rotates, they confirmed it retains its ability to encrypt data that only your devices can decrypt.Īlso, every time the key rotates, it makes much harder for anyone to misuse your Bluetooth beacons and track your movements.Īlso Read: How to Run iOS Apps on Android Device? The public key frequently changes and rotating to a new number at regular interval of time. The public key is the ‘beacon’ that your devices will broadcast via Bluetooth to nearby devices.Īs I already said, Apple has taken care of the security quite well. This data can only be decrypted by the devices which have the corresponding secret decryption key. It generates a unique private key and shares it on all those confirmed devices via end-to-end encrypted communication, and thus ensures only those machines possess the key.Įach device will also generate a public key that can be used to encrypt data, just like any other public key encryption setups. How Apple’s ‘Find My’ Offline Tracking Actually Works? Source: GSM Arenaįirst of all, in order to use Find My app, you’ll need at least two Apple devices.
