No Privacy: Cloning The AirTag


You’ve probably heard of the infamous rule 34, but we’d like to propose a new rule — call it rule 35: Anything that can be used for nefarious purposes will be, even if you…
Read more at Hackaday…