With my search you can easily follow your own Apple devices. But now a vulnerability has been discovered that also gives hackers access.
Hackers can search for my
An iPhone or a MacBook can be followed by a hack as a kind of airtag, without the owner knowing it. The researchers who come to this conclusion on their website Exactly how this hack comes about.

Hackers can do this because the trackers via Search My and Bluetooth contact other devices. With devices you have to think of a laptop or an iPhone. These devices then anonymously share the location of the tracker with Apple’s Servers. Researchers say that there is now a way with which the search mine network can be used to follow each type of Bluetooth device.
The researchers showed an example where they could accurately determine the location of a laptop within a few meters. With this they could follow the owner completely through the city. In a similar way it was also possible to follow someone else’s flight by tracking the game computer.
One of the researchers said that it is of course pretty bad if your device is hacked. But it is still much dangerous if hackers also find your location through my knowledge. And that is exactly what a hacker can do with the vulnerability in Apple’s software.

But that is how you remain safe (as much as possible)
The researchers also gave advice on how you will remain safe (as much as possible). The best way is of course to completely turn Bluetooth off, but you don’t want that. You can then no longer use many functions.
The researchers said it is important that you have to be careful. Pay attention if apps ask for bluetooth access when that is actually not necessary at all. Furthermore, it is smart to check every now and just whether there are not strange devices with your Bluetooth overview (tap ‘Settings> Bluetooth’).