Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

AirTag Has Hole Behind the Battery?

Uncategorized
1 1 0
  • AirTag Has Hole Behind the Battery? It’s Likely Been Silenced

    Apple AirTags have speakers in them, and the speaker is not entirely under the owner’s control. [Shahram] shows how the speaker of an AirTag can be disabled while keeping the device watertight. Because AirTags are not intended to be opened or tampered with, doing so boils down to making a hole in just the right place, as the video demonstrates.
    By making a hole in just the right place, the speaker can be disabled while leaving water resistance intact.
    How does putting a hole in the enclosure not compromise water resistance? By ensuring the hole is made in an area that is already “inside” the seal. In an AirTag, that seal is integrated into the battery compartment.

    Behind the battery, the enclosure has a small area of thinner plastic that sits right above the PCB, and in particular, right above the soldered wire of the speaker. Since this area is “inside” the watertight seal, a hole can be made here without affecting water resistance.

    Disabling the speaker consists of melting through that thin plastic with a soldering iron then desoldering the (tiny) wire and using some solder wick to clean up. It’s not the prettiest operation, but there are no components nor any particularly heat-sensitive bits in that spot. The modification has no effect on water resistance, and isn’t even visible unless the battery is removed.

    In the video below, [Shahram] uses a second generation AirTag to demonstrate the mod, then shows that the AirTag still works normally while now being permanently silenced.

    Why would one want to permanently silence an AirTag, putting it into so-called “stealth mode”? That’s a good question. If you’re not familiar, one of the circumstances under which AirTags emit sound is if it is separated from its owner and has been moving with someone else for some period of time. Intended as an anti-stalking feature, [Shahram] points out that this behavior can also be a nuisance or straight up undesirable. For example, one may be using the tag on a pet collar, to track one’s luggage, or on a potential theft target like a bike. Modern phones in any case alert their owners if a tag they do not own appears to be moving with them, also as an anti-stalking measure.

    In [Shahram]’s case, he has hidden an AirTag on his bike. He figures that if his bike should be stolen, a beeping AirTag would announce its existence to the thief and they would in all likelihood simply locate and discard the tracker. But if the tag is silent, the thief — still notified by their phone that a tracker is with them but unable to locate it on the bike — would be more likely to discard the bike instead, allowing it to be safely recovered.

    Regardless, the process shows how a careful understanding of a device’s internals can allow for modifications that don’t require opening the whole thing, and the process is a bit reminiscent of drilling into a Stadia controller to permanently disable the mic.

    youtube.com/embed/nO_Bg4vAuwM?…


    hackaday.com/2026/02/17/airtag…


Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • Supply chain attacks go brrrr....

    Uncategorized
    1
    0 Votes
    1 Posts
    0 Views
    Supply chain attacks go brrrr....This time, the firmware of multiple low-cost Android tablets. Images were infected with a new backdoor named Keenadu that appears to work exactly like Triadahttps://securelist.com/keenadu-android-backdoor/118913/
  • 0 Votes
    1 Posts
    2 Views
    Kayser Sòze (@conte78.bsky.social)https://bsky.app/profile/conte78.bsky.social/post/3mf2evsewsk2f> #GiordanoBruno Filosofo Viene arso vivo a Campo de' Fiori a Roma dalla Chiesa Cattolica per eresia #17Febbraio 1600 "Ho lottato, è molto; ho creduto nella mia vittoria. È già qualcosa essere arrivati fin qui. Non aver temuto di morire, aver preferito coraggiosa morte a vita imbelle."
  • 0 Votes
    1 Posts
    0 Views
    been reading up on message layer security but it seems like a dead end for distributed systems. requires trusted central servers to handle key material. the proposal/commit system seems similar to how I did things in brassica chat but centralized and sans capability security.
  • 0 Votes
    12 Posts
    8 Views
    @kenobit Limes - Il podcast di Geopolitica: Usa-Cina, sfida all’ultimo elettrone - di Fabrizio MarontaPagina web episodio: http://video.limesonline.com/audioseries/limes-il-podcast-di-geopolitica/usa-cina-sfida-all-ultimo-elettrone-di-fabrizio-maronta/320/321File multimediale: https://traffic.omny.fm/d/clips/60311b15-274a-4e3f-8ba9-ac3000834f37/f7e3c331-7a94-4a68-be74-b28700f14fc4/a7a93b4f-4883-4050-87e5-b3b601831d75/audio.mp3?utm_source=Podcast&in_playlist=2b773cd2-8217-4103-a775-b28700f14fe4Te lo condivido perché da un idea di come i colossi si striano preparando e di quanto noi siamo piccoli a livello energetico