๐๐ผ๐ ๐ฑ๐ผ๐ฒ๐ ๐๐ฝ๐ฝ๐น๐ฒ ๐ณ๐ถ๐ป๐ฑ ๐๐ผ๐๐ฟ ๐น๐ผ๐๐ ๐๐ถ๐ฟ๐ง๐ฎ๐ด ๐ถ๐ป ๐๐ต๐ฒ ๐บ๐ถ๐ฑ๐ฑ๐น๐ฒ ๐ผ๐ณ ๐ป๐ผ๐๐ต๐ฒ๐ฟ๐ฒ?
No GPS. No cellular. No WiFi. Just math and a billion devices working together.
๐ง๐ต๐ฒ ๐๐ฎ๐๐ถ๐ฐ๐
Your AirTag broadcasts a Bluetooth signal every few seconds. But it broadcasts a ๐ฝ๐๐ฏ๐น๐ถ๐ฐ ๐ธ๐ฒ๐, not an identifier.
Any nearby iPhone that picks up this signal grabs its own GPS location, encrypts it with the AirTag's public key, and uploads it to Apple's servers.
The owner downloads these encrypted reports and decrypts them locally. Apple never sees the location.
๐ง๐ต๐ฒ ๐๐ฟ๐๐ฝ๐๐ผ๐ด๐ฟ๐ฎ๐ฝ๐ต๐
Apple uses P-224 elliptic curve cryptography. The public key rotates every 15 minutes.
A Johns Hopkins cryptographer put it well: even if someone tracked your device's signals all day, they "wouldn't be able to recognize you were the same person from one hour to the next."
๐ง๐ต๐ฒ ๐ฆ๐ฐ๐ฎ๐น๐ฒ ๐๐ป๐ด๐ถ๐ป๐ฒ๐ฒ๐ฟ๐ถ๐ป๐ด
Apple turned 1+ billion devices into a global mesh of location relays. Every iPhone running iOS 13+ becomes infrastructure. No new hardware. No subscriptions.
On the backend:
๐น Reports indexed by ๐ต๐ฎ๐๐ต๐ฒ๐ฑ public keys. Apple can't link them to owners
๐น Only the ๐น๐ฎ๐๐ฒ๐๐ location is stored, caps data volume
๐น All decryption happens on-device, not Apple's servers
One clever constraint: you need two Apple devices on your account. One decrypts the other's location. Always a key holder available.
Crypto techniques have existed in academia for years. Apple was first to deploy them at a billion-device scale, with end-to-end encryption, crowdsourced infrastructure, and rotating keys that prevent tracking.
This is what good system design looks like. Solving a hard distributed systems problem by making a billion devices work together, without any of them knowing what they're doing.