Flight Tracking in Messages (and Anywhere Data Detectors Work)
The article reveals a hidden flight tracking feature in iMessage activated by specific details. It's part of Apple's DataDetection framework, working in Messages, Mail, and Notes, recognizing flight codes and other data types.
Read original articleThe article discusses a hidden flight tracking feature within iMessage that can be activated by including specific details in a message, such as airline names and flight numbers. Various texting options are provided to access the flight tracker, although the functionality can be inconsistent across different airlines and formats. The feature is attributed to iMessage but actually stems from Apple's DataDetection framework, enabling it to work not only in Messages but also in other Apple applications like Apple Mail and Notes. The system recognizes flight codes from airlines with IATA abbreviations consisting of two alphabetic letters, requiring additional context for codes with numbers or single-letter abbreviations. Despite claims that the feature is exclusive to iMessage, it functions equally well with SMS messages. This flight tracking capability is part of a broader system that identifies various types of data, including calendar events, addresses, URLs, and shipment tracking numbers.
Related
Leaking URLs to the Clown
The author describes leaking URLs during Mac app testing, with a unique URL receiving requests from a random "cloud" service every three hours. This raises privacy concerns and highlights potential risks for users.
Random Apple Pay Charges Affecting iPhone Users in Hungary
iPhone users in Hungary face unauthorized Apple Pay charges, affecting multiple banks. OTP Bank and Raiffeisen Bank acknowledge the issue, blaming Apple. Users report small repeated charges, some from canceled subscriptions. Apple is addressing the glitch, urging affected users to block cards.
Show HN: Faktor – The missing 2FA code autocomplete for Chrome
Faktor is a $9.99 Mac app simplifying 2FA code handling by integrating with Chrome, ensuring data privacy. It monitors iMessage for codes, sending them to Chrome for automatic completion, with positive user feedback. Contact hello@getfaktor.com for support.
Google takes first major step: E2EE interoperability across all messaging apps
Google Messages is integrating Messaging Layer Security (MLS) for encrypted group messaging, aligning with Google's push for secure communication and potential interoperability advancements, following MLS standards to enhance messaging security.
Signal under fire for storing encryption keys in plaintext
Signal's desktop app stores encryption keys in plaintext, risking data theft. Users' security responsibility increases post-data arrival. Despite criticism, Signal hasn't fixed the issue. Caution advised for desktop app usage.
Related
Leaking URLs to the Clown
The author describes leaking URLs during Mac app testing, with a unique URL receiving requests from a random "cloud" service every three hours. This raises privacy concerns and highlights potential risks for users.
Random Apple Pay Charges Affecting iPhone Users in Hungary
iPhone users in Hungary face unauthorized Apple Pay charges, affecting multiple banks. OTP Bank and Raiffeisen Bank acknowledge the issue, blaming Apple. Users report small repeated charges, some from canceled subscriptions. Apple is addressing the glitch, urging affected users to block cards.
Show HN: Faktor – The missing 2FA code autocomplete for Chrome
Faktor is a $9.99 Mac app simplifying 2FA code handling by integrating with Chrome, ensuring data privacy. It monitors iMessage for codes, sending them to Chrome for automatic completion, with positive user feedback. Contact hello@getfaktor.com for support.
Google takes first major step: E2EE interoperability across all messaging apps
Google Messages is integrating Messaging Layer Security (MLS) for encrypted group messaging, aligning with Google's push for secure communication and potential interoperability advancements, following MLS standards to enhance messaging security.
Signal under fire for storing encryption keys in plaintext
Signal's desktop app stores encryption keys in plaintext, risking data theft. Users' security responsibility increases post-data arrival. Despite criticism, Signal hasn't fixed the issue. Caution advised for desktop app usage.