The guy you credited in the video is not the one who discovered it or made it available in its spam form on the flipper. One of the actual competent developers who worked on this has managed to cover an area about the size of a theater with basic lower end hardware.
Thanks for the shout out! The Flipper app was written by WillyJL from Xtreme Firmware and most of the messages were discovered by me and published in the ECTO-1A/AppleJuice repo to be run on a $15 Raspberry Pi Zero W. I then worked with him to port everything to the Flipper where he discovered how to actually spam with it. I have been able to cover an area the size of a movie theater with the Raspberry Pi and a high powered bluetooth antenna( which was reverse engineered from the guys at DEF CON). Even the AirPods messages can be sent 10+ feet with that setup which needs to be within a foot or two using a Flipper. Techryptic took our code and took all the credit.
November 2022 (Techryptic's videos) is before August 2023 (ecto1a/AppleJuice created following defcon 31) correct? I don't have a calendar handy atm but i'm pretty it's a factor of several months.. maybe someone could confirm, just for full transparency sake?
Being spammed by Bluetooth popups while using my Bluetooth wireless earphones is really annoying whenever somebody near me accidentally leaves their airpod case slightly open or has a loose airpod in their bag.
There was also that stalker situation where if there was an AirTag under your cars suspension or somethin your iPhone would ping your current location (without you knowing) to a stalkers iPhone randomly.
One of the benefits of living in a rural area is being impervious to this kind of attack. If you’re doing this to me I’m probably staring at you wondering wtf you are doing in my paddock.
for the avg person maybe. but I could actually screw with you with this attack from much farther away. (lets put it this way if I can bounce a 1.2ghz radio signal off the moon, I could sit a couple miles away and BT message spam you for lulz)
@@maiyannahCabir on S60? I had a modified version if it back in 2005-2006 that worked a lot like this notification spamming, except you could attach any file you like, and it would repeatedly spam requests to any Bluetooth enabled phones in range effectively dosing them.
@@Skullet Cabir was the first that got a big spread if memory serves but there were a ton of similar viruses back in that day, you basically didnt use bluetooth back then in my area because it was so saturated with them.
I've tried to explain to so many people that Apple is no longer the king of any kind of security. They don't listen because that would go against what Uncle Apple tells them. No company is invincible y'all.
I only really trust independent Linux Distros made by random nerds that avoid showers like bees for some reason. And that's saying something as a person who has grown up around security researches and big tech companies.
This issue has been known since 2019. The guys at Carnegie Mellon who first reverse engineered this reported it to Apple and 4 years later nothing has changes. It's just that we have now made it easy to do for everyone.
I'm pretty sure this is Clara and Willy's work with the Xtreme Team. They both commented here about it. Make sure the right Dev teams get the proper credit. Thanks.
Flipper is based on the STM32WB55, I guess the 2.4GHz protocols like BT come directly from the microcontroller, which means that building a PA ( power amp ) for the RF is relatively easy as it is supported directly at hardware level by the microcontroller. Though, you got to play a bit with the examples that are given by ST and with the option bytes, it´s nothing really tragic as far as experimentation goes, maybe you burn a couple front ends, which though in theory should also not be all that easy because the RF output comes from a balun built in the SoC, point being is that getting a PA on a flipper or designing a custom board is NOT all that difficult, especially if you have access to a spectrum analyzer with a trackgen. These little buggers are actually really powerful microcontrollers, unfortunately you have to go with the "locked" firmware ST provides for the co-processor, which I guess that it is based on the BlueNRG as the microcontroller is essentially a SoC, so maybe by playing around one might be able to extract the "locked" firmware. Still it let´s you control a lot of parameters of the co-processor, so it is not all that limiting. TL;DR We are going to get more Flipper News the more people use it and yes you can most likely if the pin is unused, get a PA working with it. Edit: so with a good PA design and an antenna you can actually start trolling people in almost KM kind of ranges. Probably you are not going to be able to receive at more than 100m but might be able to pop a notification in a kilometer radius.
@@Ginfidel Don't know about FCC, in Europe in the ISM band you can transmit with a maximum of 1W and 2W if you got an amateur radio license, If I remember those numbers correctly.
This exploit was made by WillyJL and the team at Xtreme, credit the real people not the skid who claimed to do it but only got a small part to work but very inconsistently
A major problem if you are ta targeted. Proper android phones still have alphabet soup using USB attacks. iPhones don't have this in addition to safari-based remote code execution built into iOS
It is possible to live without Bluetooth. I'm also the only person I know who still connects their PC to broadband with a cable, because it's faster and more secure, and more reliable.
Same, bluetooth was always insecure and I never liked, I'll never use it. I just prefer wired stuff, no need for recharging, no delayed latency, you can't lose connection randomly and it connects specifically to the device I plug it into. There are brainless apple fanboys however, saying "Imagine not just airdropping files in 2023💀".
You can also use Wi-Fi if you desire, which, ironically is still much more secure than a outdated piece of technology, which is still in use to this day, and has known bugs and vulnerabilities like this. Imagine you're a iphone user and you're rapidly touching your keyboard, when suddenly, a random pop-up comes in and you accidentally click "connect". Congratulations. You just opened your phone to possible cyber attacks, all of that in the name of trying to do all sorts of mental gymnastics, just to tell people to "WhY nOt jUSt lEaVe BluEttootH alWAYs On?", since it's soo "secure" because it's a iphone. Meanwhile in android users, we don't suffer from that bluetooth nonsense, because there's no reason to leave it always on, and it drains our battery. And even if we leave it on, you'd have to manually go to the bluetooth page, then connect to the device you want, and then said device needs the code that you got from your phone in order to even pair with your device. (although this doesn't apply to all devices. Devices that have no UI, and are used to only output sound, such as speakers or headphones, can be connected without a code) Yeah, maybe im boasting a bit here with androids, but i find it ironic how the most "secure" devices out there that come from apple, the most "secure big tech corporation", allow these things to slip up, and then later say it's a "feature" and not a "bug". That's like spywaresoft finally saying that "yes, we've been hardware-based backdoors, just so our buddies from the CIA and NSA can spy on everyone who uses our products, but don't worry about that, because it's a feature and not a bug!"
I tested this on iOS 17 and the fact that it crashed the system opens up the possibility of arbitrary code injection. This is probably already taking place in the wild. Great way to 'OWN' a new iPhone.
@@AEw5JdbLyvEFThis. Bluetooth has been a lifesaver for me. Too many ruined headphones and jacks and holes. "Being careful" is not an option for me as I use them on the go all the time and with cans that don't leave my head easily if the cable gets stuck somewhere. With no wires I avoid all those problems. Plus, unless you're a picky audiophile, a decent pair under 100$ can sound plenty fine. 100% wired when I'm at my PC though.
Apple is the kind of company to put the responsibility on the user to be cautious when using bluetooth due to an exploit but won't give the responsibility to the user to be cautious for sideloading apps 🤣
iOS 16 along with MacOS 13 being based off of FreeBSD and having weird security flaws like this now and then really doesn't surprise me for some reason.
This isn't an issue with FreeBSD, it's been around for years before iOS 16. It's only making the news now because it's been ported to the flipper zero.
@@UNcommonSenseAUS Enlighten me, sounded like he was blaming the bug on FreeBSD. I've personally known about this "bug" for like 4+ years now. It's been an issue since apple released airpods.
FreeBSD is a great OS. What Apple takes and does with it is on them. Dont want Bluetooth on FreeBSD? Make a new kernel omitting it. FreeBSD and the other BSD's are miles ahead of linux
@@kld997you can might explain me how they are ahead from Linux I have seen bsd have drivers from Linux freebsd have less CVES then linux but that doesn't mean it is secure and I don't want any company to grab the open source code and make it close source
I've heard of someone's android device getting messed by these attacks-- which was terrible because the devices helped the owner manage their insulin pump. If they hadn't been able to fix it, they would've had to go to the hospital.
When Jayson Tatum isn’t exploiting holes in Eastern Conference defenses he’s warning us about exploits in software we use every day. A true 21st century hero
Are you seriously deleting comments of people who say who the actual creator of this app is? Bruh, lmao, WillyJL is the one who actually made the app, from Xtreme
I would like to think that this is a useless attack because Bluetooth should be turned off when it’s not in use, but they’re called normies for a reason.
And this is why I NEVER USE BLUETOOTH, not even for headphones or carplay. It just poses a security risk, and it’s less convenient to charge Bluetooth devices.
It doesn't turn off the underlying Bluetooth LE tho. It's built natively into the iOS springboard and can't be turned off without a Jailbreak. You can see the dude in the video turning Bluetooth off with control centre and it doing nothing.
@@megatronskneecap The shortcuts turn it off completely as if you went into the settings. Or do you mean that it still doesn't turn off the Bluetooth LE?
Why does Bluetooth by-default respond to pairing attempts and stuff like that? Unless I initiate the interaction or am temporarily receptive to strangers it should be utterly silent just drop the packets dead to anything unknown trying to do something on my device. :V
The option doesn't need to block advertisement packets, it just needs to suppress the popup. You can maintain AirTag detection without bothering the user repeatedly about nearby devices.
Been curious about the Meshtastic network and the use of LoRa devices for a while. Any plans on expanding on this technology? There are a few youtubers that talk about this and its practical uses, some of the explanations can be way over my head with technicals , you have a good way of breaking down these and bringing light to alt tech/communications.
I remember the time when I first made my own java app for my nokia xpress music. It is an app that targets Bluetooth's vulnerability at that time which enables me to control someone's device and do stuff like texting, calling, extracting numbers from phone book, extracting text messages, setting alarms, and do some remote executions....
I already get these annoying pairing requests on android when going on buses sometimes, usually from some random oneplus buds. I wouldn't even call it an exploit, but if it is, its not exclusive to iphones since apearently any Bluetooth earphones can do it.
@@MrElmostudiosI'm using a Xiaomi phone but there's nothing special about it that makes this possible. apearently called "Google fast pair", is a feature available since android 6 to utilize BLE for the pairing process. But not many Bluetooth devices actually implement it, I'm only aware of Google and OnePlus doing it.
Ive never had someone elses connect to my phone, but I had my galaxy buds connect to someone elses phone randomly. No idea if they pressed anything, but it was a little weird.
I am sorry to say however you just like a couple other channels have your information ALL WRONG!! The individual that you have sited as the dev and who discovered this did absolutely none of the sort he stumbled uon an actual Devs repo and copied the cod posting in his blog and from that moment has claimed the code as his own PLEASE DO THE RIGHT THING AND MAKE THE CORRECTION SO THAT WE CAN LET THE AMAZINGLY TALENTED DEVS THE RESPECT/ADMIRATION/etc. He doesn't deserve any clout because of this and needs to as a content maker yourself you should be on board with not helping him with gaining off the backs of others hard work
Thank goodness I only turned on Bluetooth only when I have my Huawei smartwatch or my Sony XM4s on because I will save battery life on my phone. Meanwhile for my headphones I just change the eq settings on the app to get around the poor sound quality of my headphones when it is in Bluetooth mode.
It looks like this only affects iOS 16 because it's dependent on a popup notification that doesn't seem to be available on earlier iOS version. I've tested both the Linux and ESP32 versions of this on two iPhones running iOS 14 and 10 and they both don't work, let alone show up in the scanned Bluetooth devices list (which is odd considering it's sending advertisement packets which should theoretically be always visible).
(I am writing with the help of a translator.) Question about wireless headphones. How safe and private is it to use wireless headphones now? At the moment I use regular wired earphones, but for the sake of convenience I’m thinking about wireless headphones. My devices only support Bluetooth 5.0 and 5.1 where there is no proper encryption. What do you think of it?
My linux desktop does bluetooth safe. If it sees a new bluetooth device and I'm not expecting to connect, the computer does nothing I can't safely ignore.
I was staying at a hotel last week and someone in the room above me (I can hear them) tried connecting to my phone. I canceled the request and turned Bluetooth off instantly. Not sure what they were trying to do or if they were just idiots (they sounded like it). I have an Android. Don't accept random Bluetooth requests. And I'd keep it off if you are not using it in a public space.
Basically the wrong person was credited. I hate to see misinformation like this out here. Besides that this video was amazing. Great quality, audio, editing. Top notch.
It takes time to discover the correct signatures needed to send the payload foe stuff like this to work. More people have seemingly done work on apple and therefore have made these payloads accessible. Android is probably possible but due to the different products and ecosystems its more difficult to exploit and therefore more difficult to make something like this.
Jailbreak's are exploits in iOS to alter the physical appearance and behaviour of your devices springboard. Other than that it really does nothing and could never be achieved with a flipping wireless standard.@@lenoirx
I really don't like devices that don't let me disable certain antennas or communication protocols when I'm not using them. Heck, even I love devices that have physical buttons to disable them. I have two "ordinary everyday" examples where is unbearable not having those options. One: Android TV's. Some of them don't allow you to disable bluetooth or BT discovery "permanently". The result? Your idiot neighbors trying to pair to your device while you are watching something. The same goes to "guest mode" on Chromecast built-in. You can only disable it in an inconvenient way by using the "Home app". Example two: ISPs using the modem to allow a "public" network alongside your own, sometimes, without the option to opt-out. So, if you have your own router and don't need the modem's WiFi and want to completely disable it, you can't. And in other countries you can't buy your own modem with that capability in the form of physical buttons. And so on... I'm against the "is for your own good" in a totalitarian way. It should be in any case an obscure option in a hidden menu to deter "normies" as Mental Outlaw describes them.
It already is banned. It was before it ever came out. Illegally transmitting on restricted frequencies or transmitting with the intent to block/jam communication has been illegal for decades They couldn't ban the production of a device like the flipper without seriously cheddar bobbing themselves either, since every government relies on this stuff You've been able to buy baofengs for less than $20 for years and people do use them to jam frequencies (usually some disgruntled guy jamming a repeater), and the government never went out of their way to ban them
Yes, I originally wrote it for a Raspberry Pi zero. At this point it’s been ported to an esp-32 and Pi pico and flipper so yeah under $20 to do it but flipper is the easiest
You should be able to with android and a terminal emulator, but it's going to be a hell of a ride. So I would just recommend to unlock the bootloader and install another OS all together (some linux distro that supports your SOC and touch) With an I phone it most likely is impossible...
Also is it just me?; I think that we should stop making these videos and make some underground group so all hackers so know, and we stop alerting the major corporations (because they always patch it). But the good thing is even if they patch it, there is always another way around
The guy you credited in the video is not the one who discovered it or made it available in its spam form on the flipper. One of the actual competent developers who worked on this has managed to cover an area about the size of a theater with basic lower end hardware.
Thanks for the shout out! The Flipper app was written by WillyJL from Xtreme Firmware and most of the messages were discovered by me and published in the ECTO-1A/AppleJuice repo to be run on a $15 Raspberry Pi Zero W. I then worked with him to port everything to the Flipper where he discovered how to actually spam with it. I have been able to cover an area the size of a movie theater with the Raspberry Pi and a high powered bluetooth antenna( which was reverse engineered from the guys at DEF CON). Even the AirPods messages can be sent 10+ feet with that setup which needs to be within a foot or two using a Flipper. Techryptic took our code and took all the credit.
@@Ecto1Athat's crazy I when people do stuff like that. stealing credit for others work is so effed up
Based.
@@Ecto1A nice work ese
November 2022 (Techryptic's videos) is before August 2023 (ecto1a/AppleJuice created following defcon 31) correct?
I don't have a calendar handy atm but i'm pretty it's a factor of several months.. maybe someone could confirm, just for full transparency sake?
Being spammed by Bluetooth popups while using my Bluetooth wireless earphones is really annoying whenever somebody near me accidentally leaves their airpod case slightly open or has a loose airpod in their bag.
There was also that stalker situation where if there was an AirTag under your cars suspension or somethin your iPhone would ping your current location (without you knowing) to a stalkers iPhone randomly.
average apple cuck
Enjoy the benefits of the "ecosystem"
I can’t believe the guy who made this video falsely claimed this work as his own. Like it’s already on github
@@SpacePlexus??
One of the benefits of living in a rural area is being impervious to this kind of attack. If you’re doing this to me I’m probably staring at you wondering wtf you are doing in my paddock.
Lady, I'm just a fucking horse
Why are you yelling at me
for the avg person maybe. but I could actually screw with you with this attack from much farther away. (lets put it this way if I can bounce a 1.2ghz radio signal off the moon, I could sit a couple miles away and BT message spam you for lulz)
@@Dratchev241what
OpenBSD is right again: no Bluetooth - no holes.
haha yup
Bluetooth is ancient caveman technology at this point. It still sounds like s**t when used for audio and hasn't improved much since 2006.
Open Based (Open🅱SD)
@@megatronskneecapsounds good with AptX
Cuck license
Bluetooth is one of the most insecure wireless methods out there and exploits like this are numerious.
It also was the vector of the literal first mobile virus, so the more things change, the more things stay the same.
@@maiyannahCabir on S60? I had a modified version if it back in 2005-2006 that worked a lot like this notification spamming, except you could attach any file you like, and it would repeatedly spam requests to any Bluetooth enabled phones in range effectively dosing them.
@@Skullet Cabir was the first that got a big spread if memory serves but there were a ton of similar viruses back in that day, you basically didnt use bluetooth back then in my area because it was so saturated with them.
@baked777You just uh, keep thinking that.
The older it gets, the more engrained in everyday life it gets, the worse it'll be
I've tried to explain to so many people that Apple is no longer the king of any kind of security. They don't listen because that would go against what Uncle Apple tells them.
No company is invincible y'all.
I only really trust independent Linux Distros made by random nerds that avoid showers like bees for some reason. And that's saying something as a person who has grown up around security researches and big tech companies.
This issue has been known since 2019. The guys at Carnegie Mellon who first reverse engineered this reported it to Apple and 4 years later nothing has changes. It's just that we have now made it easy to do for everyone.
apple has always been super insecure. Mainly because there are so few models that finding exploits is more valuable
actually much better... one of the main issues with Apple are the libraries they use/ plus webkit..both are full of holes..@@SourceHades
@@SourceHades Android users are better off because they use common sense instead of depending on Apple for everything.
I'm pretty sure this is Clara and Willy's work with the Xtreme Team. They both commented here about it. Make sure the right Dev teams get the proper credit. Thanks.
Yup, i've seen them working on it.
There seems to be an initial discovery about a year ago, and they have now improved and adapted it for the flippy.
@@blinking_dodo It was discovered almost 3 years ago, just adapted to the flipper now
Flipper is based on the STM32WB55, I guess the 2.4GHz protocols like BT come directly from the microcontroller, which means that building a PA ( power amp ) for the RF is relatively easy as it is supported directly at hardware level by the microcontroller. Though, you got to play a bit with the examples that are given by ST and with the option bytes, it´s nothing really tragic as far as experimentation goes, maybe you burn a couple front ends, which though in theory should also not be all that easy because the RF output comes from a balun built in the SoC, point being is that getting a PA on a flipper or designing a custom board is NOT all that difficult, especially if you have access to a spectrum analyzer with a trackgen. These little buggers are actually really powerful microcontrollers, unfortunately you have to go with the "locked" firmware ST provides for the co-processor, which I guess that it is based on the BlueNRG as the microcontroller is essentially a SoC, so maybe by playing around one might be able to extract the "locked" firmware. Still it let´s you control a lot of parameters of the co-processor, so it is not all that limiting.
TL;DR We are going to get more Flipper News the more people use it and yes you can most likely if the pin is unused, get a PA working with it.
Edit: so with a good PA design and an antenna you can actually start trolling people in almost KM kind of ranges. Probably you are not going to be able to receive at more than 100m but might be able to pop a notification in a kilometer radius.
Guess you'll want to avoid doing that from home or work or any other known location. FCC might start watching radio signals at those ranges
@@Ginfidel Don't know about FCC, in Europe in the ISM band you can transmit with a maximum of 1W and 2W if you got an amateur radio license, If I remember those numbers correctly.
I would have actually read all of this if it was in paragraphs.
@@PatRiot- Zoomer with an underdeveloped brain can't handle more than 5 words per block of words, very sad! Many such cases!
And they called me crazy for using wires.
they called me crazy for getting mad at phones without headphone-jacks,then they got mad too. Same thing gotta happen with wireless only devices
@@Vergillux44 Specially the wireless mnk one😂.
@@Vergillux44 use the freaking lighting or USB C cables, or a freaking dongle dude. Wtf you mean headphone jacks need to be there, literally doesn't.
@baked777 cope
What is more damaging is a strong antenna paired with this. If you send out at 100Watts you can everyone in your city such s pairing request
that sounds insanely turbobased
Add a yagi and you're in business
You will get a billion boomers running foxhunt showing up at your door.
Would that get the FCC knocking though?
Well, probably. But if you attempt to hack people somone will go after you eventually.
This exploit was made by WillyJL and the team at Xtreme, credit the real people not the skid who claimed to do it but only got a small part to work but very inconsistently
I can see it being a DOS attack but I don’t see the distributes aspect
yeah but people use DDOS for everything, ignoring what the acronym means
A major problem if you are ta targeted. Proper android phones still have alphabet soup using USB attacks. iPhones don't have this in addition to safari-based remote code execution built into iOS
maybe it affect multiple apple devices so it is DISTRIBUTED 😂
@@Ccnsword I do not understand what you are saying or how it is related to my comment, could you clarify that please?
@@genericcheesewedge4870 it isnt, bro is braindead and typing random words
Willy and Clara are the ones you need to credit! They developed this !
If this works through bluetooth outright, without Airdrop, everyone’s kinda screwed.
If it’s not required to use bluetooth earphones, it’s turned off.
It is possible to live without Bluetooth.
I'm also the only person I know who still connects their PC to broadband with a cable, because it's faster and more secure, and more reliable.
Same, bluetooth was always insecure and I never liked, I'll never use it. I just prefer wired stuff, no need for recharging, no delayed latency, you can't lose connection randomly and it connects specifically to the device I plug it into.
There are brainless apple fanboys however, saying "Imagine not just airdropping files in 2023💀".
You can also use Wi-Fi if you desire, which, ironically is still much more secure than a outdated piece of technology, which is still in use to this day, and has known bugs and vulnerabilities like this.
Imagine you're a iphone user and you're rapidly touching your keyboard, when suddenly, a random pop-up comes in and you accidentally click "connect". Congratulations. You just opened your phone to possible cyber attacks, all of that in the name of trying to do all sorts of mental gymnastics, just to tell people to "WhY nOt jUSt lEaVe BluEttootH alWAYs On?", since it's soo "secure" because it's a iphone.
Meanwhile in android users, we don't suffer from that bluetooth nonsense, because there's no reason to leave it always on, and it drains our battery. And even if we leave it on, you'd have to manually go to the bluetooth page, then connect to the device you want, and then said device needs the code that you got from your phone in order to even pair with your device. (although this doesn't apply to all devices. Devices that have no UI, and are used to only output sound, such as speakers or headphones, can be connected without a code)
Yeah, maybe im boasting a bit here with androids, but i find it ironic how the most "secure" devices out there that come from apple, the most "secure big tech corporation", allow these things to slip up, and then later say it's a "feature" and not a "bug". That's like spywaresoft finally saying that "yes, we've been hardware-based backdoors, just so our buddies from the CIA and NSA can spy on everyone who uses our products, but don't worry about that, because it's a feature and not a bug!"
Cable is the only way to get a proper Gigabit connection. I paid for the full network plan ($11 monthly) so I'm going to use the full network plan.
I tested this on iOS 17 and the fact that it crashed the system opens up the possibility of arbitrary code injection. This is probably already taking place in the wild. Great way to 'OWN' a new iPhone.
This reminds me of highschool when spam air dropping files on people.
please credit Xtreme Firmware people for this, that guy stole it
I’m so proud that I use wired headphones, MP3 players, and wire transfer. #ObsolescenceForTheWin
Bluetooth sounds like it's playing through a wall anyway. Even with Apple's $500 debut AirPods "Max".
unless your input jack is broken :v
@@AEw5JdbLyvEFThis. Bluetooth has been a lifesaver for me. Too many ruined headphones and jacks and holes. "Being careful" is not an option for me as I use them on the go all the time and with cans that don't leave my head easily if the cable gets stuck somewhere. With no wires I avoid all those problems. Plus, unless you're a picky audiophile, a decent pair under 100$ can sound plenty fine. 100% wired when I'm at my PC though.
🍷🗿
@@AEw5JdbLyvEF The lightning connector is less reliable than the headphone jack on the older iphones.
Apple is the kind of company to put the responsibility on the user to be cautious when using bluetooth due to an exploit but won't give the responsibility to the user to be cautious for sideloading apps 🤣
And people say iphones are the most secure phones lmao
iCloud hack in 2014 leaked nudes.
I think it's new problem(the ddos is old, but via bluethooth, i think its considered as a new technique), even i using an android, i only hear it now.
iOS 16 along with MacOS 13 being based off of FreeBSD and having weird security flaws like this now and then really doesn't surprise me for some reason.
This isn't an issue with FreeBSD, it's been around for years before iOS 16. It's only making the news now because it's been ported to the flipper zero.
@@forid200 that's not what he said at all. You confused son.
@@UNcommonSenseAUS Enlighten me, sounded like he was blaming the bug on FreeBSD. I've personally known about this "bug" for like 4+ years now. It's been an issue since apple released airpods.
FreeBSD is a great OS. What Apple takes and does with it is on them.
Dont want Bluetooth on FreeBSD? Make a new kernel omitting it.
FreeBSD and the other BSD's are miles ahead of linux
@@kld997you can might explain me how they are ahead from Linux I have seen bsd have drivers from Linux freebsd have less CVES then linux but that doesn't mean it is secure and I don't want any company to grab the open source code and make it close source
About iphone and Bluetooth, after every update it enables Bluetooth, so you have to remember to disable it again.
he said that
I've heard of someone's android device getting messed by these attacks-- which was terrible because the devices helped the owner manage their insulin pump. If they hadn't been able to fix it, they would've had to go to the hospital.
Bluetooth is the worst communication standard ever devised. Wi-Fi in the XP SP2 era was less annoying and unreliable.
When Jayson Tatum isn’t exploiting holes in Eastern Conference defenses he’s warning us about exploits in software we use every day. A true 21st century hero
Ahh the Flipper has graduated from opening random Tesla charging ports haha
Where’s the credit for Xtreme firmware developers
Are you seriously deleting comments of people who say who the actual creator of this app is? Bruh, lmao, WillyJL is the one who actually made the app, from Xtreme
I would like to think that this is a useless attack because Bluetooth should be turned off when it’s not in use, but they’re called normies for a reason.
but if they have apple watch its always in use..same goes with those who use their watch with a mac..
the person you credited isn't the original source!!!!! check the other comments on this!
iOS 13 was so bad they stopped paying those who discovered bugs and exploits so I would say apples track record is 💩
I have to correct you, this is not a DDoS, just a regular DoS.
Ahh nice relevant clips from Mr Robot, love that series. Never gets tired watching.
And this is why I NEVER USE BLUETOOTH, not even for headphones or carplay. It just poses a security risk, and it’s less convenient to charge Bluetooth devices.
Oh gosh. One of my sisters has an iphone so she'd be pissed if it happened to her. 💀🤣
I use Shortcuts to turn off/on things like Bluetooth, WiFi or mobile data. I can really recommend it.
It doesn't turn off the underlying Bluetooth LE tho. It's built natively into the iOS springboard and can't be turned off without a Jailbreak. You can see the dude in the video turning Bluetooth off with control centre and it doing nothing.
@@megatronskneecap The shortcuts turn it off completely as if you went into the settings. Or do you mean that it still doesn't turn off the Bluetooth LE?
@@guy5282it's probably the thing that helps with fast pairing?
Bluetooth has historically been super insecure. This should be disabled when you aren't using it anyways
5:51 Do this on public transport during rush hour as people are going back home and just watch the amount of people rage XD
Why does Bluetooth by-default respond to pairing attempts and stuff like that? Unless I initiate the interaction or am temporarily receptive to strangers it should be utterly silent just drop the packets dead to anything unknown trying to do something on my device. :V
My little dose of daily reality, just for coffee time, thanks Mental Outlaw!
glowie
Hi normies!
The option doesn't need to block advertisement packets, it just needs to suppress the popup. You can maintain AirTag detection without bothering the user repeatedly about nearby devices.
No need to pass of the code as your own. Please credit where you obtained the code / give developers their credit.
he didn't?
@@shinyrayquaza9 there was a good article from the xtreme team give it a read
Hey I think you credited the wrong person in the video, wasn't this discovered by the creators of Xtreme firmware?
Been curious about the Meshtastic network and the use of LoRa devices for a while. Any plans on expanding on this technology? There are a few youtubers that talk about this and its practical uses, some of the explanations can be way over my head with technicals , you have a good way of breaking down these and bringing light to alt tech/communications.
The flag background on the iPhone hurts my eyes
I really hate my Whyphone and I hate it even more now.
Where's the credit for Xtreme firmware developers who actually done this?
I remember the time when I first made my own java app for my nokia xpress music. It is an app that targets Bluetooth's vulnerability at that time which enables me to control someone's device and do stuff like texting, calling, extracting numbers from phone book, extracting text messages, setting alarms, and do some remote executions....
isn't this DoS instead of DDoS? I don't see how this is "distributed" per se
I already get these annoying pairing requests on android when going on buses sometimes, usually from some random oneplus buds.
I wouldn't even call it an exploit, but if it is, its not exclusive to iphones since apearently any Bluetooth earphones can do it.
what phone are you using I've never seen that happen?
You can also call spam someone or spam someone with iMessages. It will ruin parts of your day but won't ruin you job or friend status.
@@MrElmostudiosI'm using a Xiaomi phone but there's nothing special about it that makes this possible.
apearently called "Google fast pair", is a feature available since android 6 to utilize BLE for the pairing process.
But not many Bluetooth devices actually implement it, I'm only aware of Google and OnePlus doing it.
@@MrElmostudios Some newer earbuds have android quick pair, works exactly like apple's one, pops up with an image and asks you to connect.
Ive never had someone elses connect to my phone, but I had my galaxy buds connect to someone elses phone randomly. No idea if they pressed anything, but it was a little weird.
1:25 looks like an minecraft hcf base
Lmao fr
💀
Once again Apples walled garden has failed them
I am sorry to say however you just like a couple other channels have your information ALL WRONG!! The individual that you have sited as the dev and who discovered this did absolutely none of the sort he stumbled uon an actual Devs repo and copied the cod posting in his blog and from that moment has claimed the code as his own PLEASE DO THE RIGHT THING AND MAKE THE CORRECTION SO THAT WE CAN LET THE AMAZINGLY TALENTED DEVS THE RESPECT/ADMIRATION/etc. He doesn't deserve any clout because of this and needs to as a content maker yourself you should be on board with not helping him with gaining off the backs of others hard work
We need to normalize standing up and yelling "WHO IS HACKING MY PHONE" when this happens in public
Yeah, that would be funny to the hacker. Do that!
Hacking ist a nom proved issue ...
Thank goodness I only turned on Bluetooth only when I have my Huawei smartwatch or my Sony XM4s on because I will save battery life on my phone. Meanwhile for my headphones I just change the eq settings on the app to get around the poor sound quality of my headphones when it is in Bluetooth mode.
Apple security is like Schroedinger cat, jailbreak exists but Apple doesnt see it and patches it in secret.
DoS* not DDoS
It looks like this only affects iOS 16 because it's dependent on a popup notification that doesn't seem to be available on earlier iOS version. I've tested both the Linux and ESP32 versions of this on two iPhones running iOS 14 and 10 and they both don't work, let alone show up in the scanned Bluetooth devices list (which is odd considering it's sending advertisement packets which should theoretically be always visible).
Bluetooth remains fully disabled on my phone all the time. There is no loss, and I quite enjoy the quality over the airjunk being peddled around.
(I am writing with the help of a translator.)
Question about wireless headphones. How safe and private is it to use wireless headphones now? At the moment I use regular wired earphones, but for the sake of convenience I’m thinking about wireless headphones. My devices only support Bluetooth 5.0 and 5.1 where there is no proper encryption. What do you think of it?
You’re fine first of all it’s just Bluetooth second you’re not worth targeting if someone was to hack you
I don't get why people are so excited for this, it's NOT a new exploit. It's been out for years and years now. It's only new to the Flipper Zero.
"Give iPhone users more control"
Apple: Hahahahahaha, good joke!
The good thing with bluetooth is that the guy has to be close enough that you can go and punch him in the face
So I wouldn't worry about it
The bad thing about doing that is you'll eat a concealed carry surprise.
It can reach across a movie theater so you must have some long arms.
Out if the box flipper zero is weak, add a more powerful antenna extension to it and it’s a beast
i do this to bug my coworkers when were bored, i use my airpods. just open and close them lol
My linux desktop does bluetooth safe. If it sees a new bluetooth device and I'm not expecting to connect, the computer does nothing I can't safely ignore.
Best security? Security trough obscurity is not security, marketing is strong
Will this work for annoying neighbors playing their music load😊
Learn, stock, and prepare whilst you can. Time is narrow, use it wisely.
I was staying at a hotel last week and someone in the room above me (I can hear them) tried connecting to my phone. I canceled the request and turned Bluetooth off instantly. Not sure what they were trying to do or if they were just idiots (they sounded like it). I have an Android. Don't accept random Bluetooth requests. And I'd keep it off if you are not using it in a public space.
Definitely got this one wrong. Please re-edit
How?
Please expand
The creators of this BLE Spam isn’t the tech guy he mentioned in this video.
Basically the wrong person was credited. I hate to see misinformation like this out here. Besides that this video was amazing. Great quality, audio, editing. Top notch.
I can’t see why this isn’t effect Android and Windows? Why do you target only Apple?
It takes time to discover the correct signatures needed to send the payload foe stuff like this to work. More people have seemingly done work on apple and therefore have made these payloads accessible.
Android is probably possible but due to the different products and ecosystems its more difficult to exploit and therefore more difficult to make something like this.
Airdrop is an apple application, not google or microsoft, therefore it is an apple program.
maybe some rate limit on that bluetooth LE discovery? Or for. ex DOS detection, so the discovery would be shut down when such an attack is detected.
Who needs Bluetooth, my 15lb boombox on my shoulder blasting those hot hist just fine 🎵 🔊
"These aren't your airpods" No shit I don't have any
Turning Bluetooth off using Shortcuts completely disables it and you can add it as a button widget.
This is kind of like the mass distraction thing in watch dogs where everyone is on their phone confused while aiden escapes lol. Cool shit imo
I knew it was coming.. 3.5 mm jacks and physical SDcard/flashdrive transfers ftw. Good thing Apple is getting those usbC ports.
hope this means some kind of unpatchable jailbreak
Bluetooth is not achieving a kind of unpatchable jailbreak ☠️
@@V3locitiesIt could, who knows
Jailbreak's are exploits in iOS to alter the physical appearance and behaviour of your devices springboard. Other than that it really does nothing and could never be achieved with a flipping wireless standard.@@lenoirx
This just seems to be spamming Bluetooth notifications, it’s unlikely to lead to anything besides annoying someone.
the software is not made by the guy credited in this video. its not his software its not his code. find the real source
I need the flipper zero, getting it as soon as I get my security deposit back
When will Bluetooth stop compressing audio??
Genuine question. What is a script kitty. I assume it's a person that doesn't write code and just buys or copys known exploits. Is this correct?
Ye
I thought it was kiddie, implying novice child/low lifes using others harmful code, like aimbotters
@@shinyrayquaza9 Yes
people have definitely tried to hack me this way. glad i always rejected it. thanks for this info
I really don't like devices that don't let me disable certain antennas or communication protocols when I'm not using them. Heck, even I love devices that have physical buttons to disable them. I have two "ordinary everyday" examples where is unbearable not having those options. One: Android TV's. Some of them don't allow you to disable bluetooth or BT discovery "permanently". The result? Your idiot neighbors trying to pair to your device while you are watching something. The same goes to "guest mode" on Chromecast built-in. You can only disable it in an inconvenient way by using the "Home app". Example two: ISPs using the modem to allow a "public" network alongside your own, sometimes, without the option to opt-out. So, if you have your own router and don't need the modem's WiFi and want to completely disable it, you can't. And in other countries you can't buy your own modem with that capability in the form of physical buttons. And so on... I'm against the "is for your own good" in a totalitarian way. It should be in any case an obscure option in a hidden menu to deter "normies" as Mental Outlaw describes them.
wonderful I have something to watch while eating..
Enjoy your meal
Me too
@@MentalOutlawenjoying pirating others work?
Almost feel like this is on purpose for the government to find a reason to outlaw/ban the flipper (if thats even possible.)
If I am found dead. It was not suicide.
It already is banned. It was before it ever came out. Illegally transmitting on restricted frequencies or transmitting with the intent to block/jam communication has been illegal for decades
They couldn't ban the production of a device like the flipper without seriously cheddar bobbing themselves either, since every government relies on this stuff
You've been able to buy baofengs for less than $20 for years and people do use them to jam frequencies (usually some disgruntled guy jamming a repeater), and the government never went out of their way to ban them
How do we know you're dead does the weird PFP just disappear or somethin?@@TundrousOfficial
Cant you do the same with an arduino or a esp8266 that only cost 1 - 5$? Flipper Zero is way more expensive.
Yes, I originally wrote it for a Raspberry Pi zero. At this point it’s been ported to an esp-32 and Pi pico and flipper so yeah under $20 to do it but flipper is the easiest
As far as airdrop goes, you can limit it to contacts.
This mean that I just need to get a flipper zero to make iTODDLERS seethe
Or…you could just use the phone you have and stop worrying about what phone other people use.
the treadmills at my gym do this, ping the nfc on my device over and over again so annoying
Speaking of phones, can you run a tor relay from a phone? Would be cool to see
You should be able to with android and a terminal emulator, but it's going to be a hell of a ride. So I would just recommend to unlock the bootloader and install another OS all together (some linux distro that supports your SOC and touch) With an I phone it most likely is impossible...
@@thecon_quererarbitraryname6286 I'm asking cause I'm over video some time ago he said he would try, and I was curious
Seems like a real simple fix, just obfuscate signals....
Also is it just me?; I think that we should stop making these videos and make some underground group so all hackers so know, and we stop alerting the major corporations (because they always patch it). But the good thing is even if they patch it, there is always another way around
More or less of a denial of services. Still was thinking this however is it not location based more or less ?
Misinformation. You know who developed it and are lying to your audience. Stop deleting the flipper community’s comments would you?
He has been misinfornative in the last videos
I'll get this just to troll my friends with the pop-ups 😂😂
7:04 I don’t really think it sounds very hard to do. iOS is very easy to operate.
@0:43 - "removing more wires from our lives..." Show a picture of a woman with wired headphones. Seems legit.
Wired devices win again. Nobody will take my precious wires from me!!!!!