🔓Successfully jailbroke Apple AirTags by glitching the CPU core voltage and re-enabling the debugging hardware.
💻Used a Raspberry Pi Pico and voltage-based fault injection to perform the glitching attack.
📝Modified the firmware to change the URL sent when the AirTag is NFC scanned, effectively rickrolling users.
💡Discovered the potential for using the AirTag's accelerometer as a makeshift microphone for research purposes.
🌟Explored the possibilities of further experimentation and customization with jailbroken AirTags.