How ‘Find My’ Mac works in macOS Catalina and iOS 13 (2024)

How ‘Find My’ Mac works in macOS Catalina and iOS 13 (1)

byJonny Evans

how-to

Jun 21, 20195 mins

AppleMobileSecurity

Apple has created cutting-edge system that can safely, securely and privately help users find lost or stolen things.

How ‘Find My’ Mac works in macOS Catalina and iOS 13 (2)

Credit: Apple

Apple is changing how its Find My Mac tool works in macOS Catalina and iOS – it will now use Bluetooth and should find your Mac even when it is asleep.

How does ‘Find My’ Mac work?

Apple is combining two apps – Find My Friends and Find My iPhone into a new ‘Find My’ app.

The combined app offers what we are used to from each one of these individual apps, but introduces new tools based on Bluetooth.

The ideas is that it will use low energy Bluetooth signals to help bring people together with lost things.

What did Apple tell us about Find My Mac?

Apple’s press release states that using the application:

“The location of a lost or stolen Mac can be securely and anonymously relayed back to its owner by other Apple devices, even when it is offline.”

“Now what’s amazing is that this whole interaction is end-to-end encrypted and anonymous,” Apple VP Craig Federighi said during his WWDC keynote.

“It uses just tiny bits of data that piggyback on existing network traffic so there’s no need to worry about your battery life, your data usage, or your privacy.”

How does this work?

The new feature works even when your Mac is sleeping with its lid closed.

The computer will continue to send low energy Bluetooth signals which can be picked up by any nearby Apple device.

The devices that detect your Mac’s signal do not know you, your Mac, or either location, all they do is transmit a heavily encrypted signal back to Apple, letting them know a Mac exists nearby.

If a user who has lost a Mac logs into their Apple ID/Find My app they will send a cryptographic key to Apple.

This key will unlock their Mac’s location.

They will then be shown the location of their lost friends and devices on a Map.

This means that only the end user can ever actually use this system to find their computer, and only when they are in possession of the Apple ID.

How does the Bluetooth signal work?

The way this works is that the Mac will send out a periodic beacon, it’s actually a rotating encryption key.

This key can be picked up by other devices that are physically nearby.

These know their location can encrypt that location and broadcast it up to Apple.

Apple can’t read this location, but the user who owns the device can log into the Find My App, download, decrypt that location and find their Mac.

Doesn’t this use a lot of battery power?

The system has been developed to use as little energy as possible.

Devices pick up the signal only when they would be looking for such a signal anyway, such as when a device wakes from sleep and reaches to connect to your Bluetooth headphones, keyboard or what not.

The location will also not be transmitted until you choose to use your device to transmit other data.

The idea is that the additional battery demands of the process are mitigated by being rolled inside of tasks you are already doing.

This means any impact on both battery life and data use is very much reduced.

OK, but how come this is safe?

Apple says the system is designed so that even Apple doesn’t learn the identity of the Lost device or the finding devices.

In common with Apple’s entire approach to data security, it continues to only seek out the bare minimum of personal data it needs to make its systems work.

One way this is really visible is in Photos, where those collections of Memories or suggested Edits are all created and developed by machine intelligence on your device.

Apple is never in the loop.

Nor is it in the loop for the Find My function.

The systems can’t read the location of the lost device or the finding device from within Find My.

Apple has crafted its solution around use of a rotating encryption key.

This means the beacon from the Mac changes over time, so it cannot be used to track you or your Mac – again, the company says it has designed this feature from the ground up with your privacy in mind.

(It may also be useful to note that Apple has also done work to secure its systems against marketing companies using Wi-Fi or Bluetooth data to locate and track user location.)

Will I need to use an Apple device?

The system is predicated on you owning (or having access to) two Apple devices – the one you have lost and the one you still have access to.

Each emits its own (changing) key, which can only be picked up by other Apple devices and only decrypted by a device you have access to that is also logged into your Apple ID, using the same private key as is recognized by the lost device.

TL;DR

Apple has created an ultra-private system that uses its entire platform with cutting edge crypotography that can safely, securely and privately help users find objects they own once they are lost or stolen.

You’ll find your stolen items on the map.

Macs equipped with a T2 chip have another layer of protection in the form of an Activation Lock, which will disable your Mac if it is lost or stolen.

Also read:

  • WWDC: 12 big announcements for enterprise users
  • WWDC: What you need to know about Sign In with Apple
  • WWDC: Get to know Apple’s 11+ new privacy tools
  • WWDC: 16+ ways Apple improved iPad productivity
  • WWDC: Apple’s iOS 13 NFC improvements are good for business
  • WWDC: Has Apple closed the door on non-Mac App Store apps?

Please follow me onTwitter, or join me in theAppleHolic’s bar & grillandApple Discussionsgroups on MeWe.

Related content

  • newsFor IT and devops, Sequoia brings iCloud to VM Macs In macOS 15, you'll be able to sign into iCloud and other Apple ID services from virtual machines — a small but significant improvement for software developers and IT admins.By Jonny EvansJun 20, 20244 minsMacDeveloperiCloud
  • news analysisWhen it comes to AI, Apple is opening up for intelligence Apple is becoming increasingly open as its research teams cook up Apple Intelligence.By Jonny EvansJun 18, 20244 minsAppleDeveloperGenerative AI
  • how-toHow to use iCloud with Windows If you have an Apple ID, you can use iCloud with Windows. Here's how to get started.By Jonny EvansJun 17, 202410 minsSmall and Medium BusinessAppleComputers
  • featureApple's grip on retail tech is strengthening From point-of-sale systems to food storage management, Apple is having an impact on parts of retail we never thought possible.By Jonny EvansJun 17, 20245 minsRetail IndustryAppleiOS

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

How ‘Find My’ Mac works in macOS Catalina and iOS 13 (2024)

References

Top Articles
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6613

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.