Book Image

Learning iBeacon

By : Craig Gilchrist
Book Image

Learning iBeacon

By: Craig Gilchrist

Overview of this book

Table of Contents (16 chapters)
Learning iBeacon
About the Author
About the Reviewers

Beacon spoofing

As a developer, one of your primary concerns should be the vulnerability of your iBeacon profile. It's very easy for anyone equipped with a Bluetooth sniffer app to determine your beacon signatures and spoof them in their own app. After all, you've already made your iPhone act as a beacon during the course of this book.

The Consumer Electronics Show (CES) 2014 offered its visitors a treasure hunt powered by iBeacons and before the conference even began, the show had been hacked by the team at Make Magazine so that they could win the treasure hunt without even being at the event. Read more about Make's audacious hack at

What Make Magazine did is downloaded the Android APK file (a compiled zip containing the Android app) and ran it through a decompiler to discover the beacon profiles used by CES.

CES treasure hunt winner

Defending against beacon spoofing

Ultimately, the best way to defend against people maliciously is to first decide whether or not you...