logo

Overview

Source: The System Design Newsletter — Neo Kim
Apple AirTags are small tracking devices that leverage a massive crowd-sourced location network (Find My Network) to locate lost items — all while preserving the privacy of both the tag owner and the devices that help locate it.

Key Concepts

Find My Network — Apple's crowd-sourced location network made up of over 1 billion Apple devices (iPhones, iPads, Macs). Any Apple device can passively detect a nearby AirTag and report its location — anonymously and encrypted.
Ultra-Wideband (UWB) — Short-range radio technology (U1 chip) that enables precise spatial awareness — distance accurate to centimeters and direction. Powers the "Precision Finding" feature.
Bluetooth Low Energy (BLE) — AirTag broadcasts a rotating encrypted identifier via BLE. Nearby Apple devices detect this signal without knowing what the tag is or who owns it.
Privacy by Design — The owner's identity is never revealed to the Apple devices that help locate a tag. Encrypted location reports are only decryptable by the tag owner.

Core Components

  • AirTag Hardware:
    • CR2032 coin battery (~1 year life)
    • BLE chip (broadcasts rotating BLE identifier)
    • U1 UWB chip (precision direction + distance)
    • NFC chip (tap-to-read lost mode contact info)
    • Speaker (audible ping for finding nearby items)
  • Find My Network (Crowd) — Every Apple device in the world acts as a passive relay node. Detects AirTag BLE signal → encrypts location + uploads to Apple servers.
  • Apple Find My Servers — Stores encrypted location reports. Cannot decrypt them (zero-knowledge for Apple).
  • Owner's iPhone — Downloads encrypted location reports from Apple servers. Decrypts them using the owner's private key to reveal the tag's location.

Location Update Flow

  1. AirTag broadcasts a rotating BLE identifier (changes periodically to prevent tracking)
  1. Nearby iPhone (even a stranger's) detects the BLE signal
  1. iPhone encrypts {location, timestamp} with the AirTag's public key
  1. Encrypted report uploaded to Apple's Find My servers
  1. Owner opens Find My app → app downloads encrypted reports from Apple servers
  1. Owner's device decrypts using private key → location revealed on map

Privacy Architecture

Property
Mechanism
Owner anonymity
Apple never knows which tag belongs to which user (end-to-end encrypted)
Relay device privacy
Stranger's iPhone doesn't know it's relaying location data
Anti-tracking (BLE rotation)
BLE identifier rotates every ~15 minutes; prevents third-party tracking by ID
Unwanted tracking alerts
iPhone alerts if unknown AirTag travels with you; Android app available

Precision Finding (UWB)

  • Works only when within ~10 meters
  • iPhone U1 chip communicates with AirTag U1 chip
  • Triangulates distance (~cm accuracy) and direction (arrow on screen)
  • Audio + haptic feedback intensifies as you approach the tag

Key Trade-offs

Decision
Reasoning
BLE over GPS
GPS requires too much power for a coin battery; BLE lasts a year
Crowd-sourced network
1B+ passive relays vs. building dedicated infrastructure
End-to-end encryption
Apple can't be compelled to reveal tag locations it can't decrypt
Anti-stalking features
Necessary to prevent misuse of a powerful tracking capability