Skip to content

Instantly share code, notes, and snippets.

@henrik242
Last active April 2, 2025 12:26
Show Gist options
  • Save henrik242/1da3a252ca66fb7d17bca5509a67937f to your computer and use it in GitHub Desktop.
Save henrik242/1da3a252ca66fb7d17bca5509a67937f to your computer and use it in GitHub Desktop.
Read AirTag data from the FindMy.app cache and convert to GPX
#!/usr/bin/env bash
#
# Reads AirTag data from the FindMy.app cache and converts it to a daily GPX file
#
# Rsyncs the data to a web accessible folder that can be displayed with e.g.
# https://gist.github.com/henrik242/84ad80dd2170385fe819df1d40224cc4
#
# This should typically be run as a cron job
#
set -o pipefail -o nounset -o errexit
export PATH=/usr/local/bin:$PATH
DATADIR=/tmp/airtag-data
TODAY=$(date +%d)
mkdir -p $DATADIR
DATA=$DATADIR/airtagdata-$TODAY.txt
GPX=$DATADIR/airtagdata-$TODAY.gpx
TAGNAME=Foobar
if [[ $(uname -s) == "Darwin" ]]; then
TOMORROW=$(date -v +1d +%d)
else
TOMORROW=$(date --date="tomorrow" +%d)
fi
rm -f $DATADIR/airtagdata-$TOMORROW.gpx
jq -r '.[] | select(.name == "'$TAGNAME'") | .location | "\(.latitude) \(.longitude) \(.altitude) \(.timeStamp/1000 | todate)"' \
$HOME/Library/Caches/com.apple.findmy.fmipcore/Items.data >> $DATA
START='<?xml version="1.0" encoding="UTF-8"?>
<gpx xmlns="http://www.topografix.com/GPX/1/1" xmlns:mytracks="http://mytracks.stichling.info/myTracksGPX/1/0" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" creator="myTracks" version="1.1" xsi:schemaLocation="http://www.topografix.com/GPX/1/1 http://www.topografix.com/GPX/1/1/gpx.xsd">
<trk>
<name>'$TAGNAME'</name>
<extensions>
<mytracks:color red="0.000000" green="0.000000" blue="1.000000" alpha="1.000000" />
<mytracks:area showArea="no" areaDistance="0.000000" />
<mytracks:directionArrows showDirectionArrows="yes" />
<mytracks:sync syncPhotosOniPhone="no" />
<mytracks:timezone offset="120" />
</extensions>
<trkseg>'
END=' </trkseg>
</trk>
</gpx>'
echo $START > $GPX
function elems() {
LAT=$1
LON=$2
ELE=$3
TS=$4
}
cat $DATA | while read line; do
elems $line
echo '<trkpt lat="'$LAT'" lon="'$LON'">
<ele>'$ELE'</ele>
<time>'$TS'</time>
</trkpt>' >> $GPX
done
echo $END >> $GPX
cp $GPX $DATADIR/airtagdata.gpx
rsync -a --exclude='*.txt' $DATADIR example.com:public_html/airtag/
@tmozes
Copy link

tmozes commented Jun 22, 2022

I am trying this script on an M1 Mac. However, this file does not seem to exist despite the FindMy app is running:

~ cat $HOME/Library/Caches/com.apple.findmy.fmipcore/Items.data
cat: /Users/tmozes/Library/Caches/com.apple.findmy.fmipcore/Items.data: Operation not permitted

Any idea how to access the data on M1s?

@henrik242
Copy link
Author

henrik242 commented Jun 23, 2022

What is the file permissions on Items.data?

@tmozes
Copy link

tmozes commented Jun 23, 2022

Hi Henrik, please see below:

~ ls -alt /Users/tmozes/Library/Caches/com.apple.findmy.fmipcore/Items.data
-rw-r--r--@ 1 tmozes  staff  6900 Jun 23 00:16 /Users/tmozes/Library/Caches/com.apple.findmy.fmipcore/Items.data

@tykowale
Copy link

@tmozes make sure your terminal has full disk access - This article can help

@fjxmlzn
Copy link

fjxmlzn commented Jul 9, 2022

Just in case it is helpful, I wrote a script that logs more information (history location, battery level, etc.) and supports more devices (AirTag, iPhone, MacBook, etc.).

https://github.com/fjxmlzn/FindMyHistory

Suggestions are welcome!

@henrik242
Copy link
Author

@fjxmlzn Cool!

@sarto89
Copy link

sarto89 commented Aug 14, 2023

Hello @henrik242 , I was looking at your great code but I still have a question.. Could be possible to get from findmy cache not only lat, long and the actual timestamp also the timestamp of the last update of the airtag?
It could happen that I read the cache right now but the last update of the Airtag was many days ago.. Thank you very much :-)

@henrik242
Copy link
Author

@sarto89 Just look at your $HOME/Library/Caches/com.apple.findmy.fmipcore/Items.data file and you might find what you're looking for.

@wilkyconsultants
Copy link

Looks like with the MacOS Sonoma 14.4 update the $HOME/Library/Caches/com.apple.findmy.fmipcore/ files became encrypted. Any idea how to decrypt these to get the file in plain text again like it was is 14.3.1 and before? I was expecting apple to chop our legs off, it has happened.

@henrik242
Copy link
Author

Are you sure they are encrypted? What does the command file $HOME/Library/Caches/com.apple.findmy.fmipcore/* say?

@wilkyconsultants
Copy link

wilkyconsultants commented Mar 8, 2024 via email

@wilkyconsultants
Copy link

wilkyconsultants commented Mar 8, 2024 via email

@henrik242
Copy link
Author

henrik242 commented Mar 8, 2024

Bummer. I'm still on Ventura, so I'm not affected (yet).

@wilkyconsultants
Copy link

Bummer. I'm still on Ventura, so I'm not affected (yet).

I am on Sonoma 14.3.1 but I built an airtag harvesting app that I was planning to go to production with for users to track the history on a map of their FindMy tags. Putting that on hold until I find out if I can decryot these files. This was expected as Apple frowns on tracking the history..

@henrik242
Copy link
Author

Maybe try putting that string in a file by itself and try to figure out what kind of encryption it is. Is it base64 encoded?

@wilkyconsultants
Copy link

wilkyconsultants commented Mar 8, 2024 via email

@hubert3
Copy link

hubert3 commented Apr 11, 2024

Also hitting this on 14.4.1

% plutil -p /Users/xxx/Library/Caches/com.apple.findmy.fmipcore/Items.data
{
  "encryptedData" => {length = 40501, bytes = 0x82f73cb2 91a2aa9f 867bd9c0 30c79f5e ... d491f5f6 52b03543 }
  "signature" => {length = 64, bytes = 0xcffcffcc d3befa46 13c3dd0b 0166762d ... eed8541f b9afbce1 }
}

@wilkyconsultants
Copy link

yes, the encryption started in 14.4 so we would expect subsequent releases 14.4.x+ to now have it permanently. Stay with macOS 10.5 to 14.3.1 and your safe. It would be nice if we could decrypt the files but we need the key to decrypt them and I can't see any way to get that as Apple does not want you to look at your own files.

@hubert3
Copy link

hubert3 commented Apr 22, 2024

The key has to be somewhere (keychain?), it should be possible to reverse engineer and re-implement the decryption

@MylesOfXyloto
Copy link

Not very familiar with GitHub, hoping that commenting will allow me to get notified about any further comments here. I've backed up my cached FindMy files just in case the encryption is cracked in the future. If anyone needs a machine running 14.4.1 for testing, let me know!

@varenc
Copy link

varenc commented Dec 5, 2024

Anyone have any updates? Hoping to get to figure out how to decrypt this. If it helps I found that it seems to look up these keychain items:

com.apple.account.AppleAccount.cloudkit-token
com.apple.account.AppleAccount.find-my-friends-app-token
com.apple.account.AppleAccount.find-my-iphone-app-token
com.apple.account.AppleAccount.find-my-iphone-siri-token
com.apple.account.AppleAccount.find-my-iphone-token
com.apple.account.AppleAccount.key-transparency-token
com.apple.account.AppleAccount.maps-token
com.apple.account.AppleAccount.search-party-token
com.apple.account.AppleAccount.token
com.apple.account.DeviceLocator.find-my-iphone-app-token
com.apple.account.DeviceLocator.find-my-iphone-siri-token
com.apple.account.DeviceLocator.token
com.apple.account.FindMyFriends.find-my-friends-app-token

But that might be a total red herring since thats are associated with accountsd. The Find My app logs also mention Initializing SharingCircleKeychain with 6 secretValues but unclear what Keychain items that maps to. If any. I suspect Apple might hide some Keychain items from the GUI completely.

@wilkyconsultants
Copy link

Anyone have any updates? Hoping to get to figure out how to decrypt this. If it helps I found that it seems to look up these keychain items:

com.apple.account.AppleAccount.cloudkit-token
com.apple.account.AppleAccount.find-my-friends-app-token
com.apple.account.AppleAccount.find-my-iphone-app-token
com.apple.account.AppleAccount.find-my-iphone-siri-token
com.apple.account.AppleAccount.find-my-iphone-token
com.apple.account.AppleAccount.key-transparency-token
com.apple.account.AppleAccount.maps-token
com.apple.account.AppleAccount.search-party-token
com.apple.account.AppleAccount.token
com.apple.account.DeviceLocator.find-my-iphone-app-token
com.apple.account.DeviceLocator.find-my-iphone-siri-token
com.apple.account.DeviceLocator.token
com.apple.account.FindMyFriends.find-my-friends-app-token

But that might be a total red herring since thats are associated with accountsd. The Find My app logs also mention Initializing SharingCircleKeychain with 6 secretValues but unclear what Keychain items that maps to. If any. I suspect Apple might hide some Keychain items from the GUI completely.

It seems no way to get by this, I tried many avenues. I have become aware of an Apple FindMy API that seems to be available to OEM tag makers but Apple will not give me access to it since I am a software engineer not a device maker. If anyone has used the API I would love a peek at it!

@saikpr
Copy link

saikpr commented Dec 26, 2024

https://gist.github.com/airy10/5205dc851fbd0715fcd7a5cdde25e7c8 should work on MacOs 14.xx, but it doesn't seem to work on 15.xx

@elzii
Copy link

elzii commented Feb 1, 2025

@wilkyconsultants @henrik242 @varenc

Note: This is not as easy in macOS 15+, since the items in ~/Library/Caches/com.apple.findmy.fmipcore/ are now encoded.
You can get them more readable in XML with sudo plutil -convert xml1 -o ~/Downloads/Items.txt ./Items.data but it's still an unknown.

And ask Gemini/Ollama/GPT-4 etc about using Darwin's security and plutil. I was able to find my apple user ID and password, which are then Base64 encoded for Basic Auth, in com.apple.account.AppleAccount.cloudkit-token.

Also, try binwalk a copy of the /usr/libexec/fmfd (find my friends daemon) with binwalk --dd='.*' fmfd to extract all to a folder in the same directory, prefixed by an underscore.

Anyone good at reading hex and byte offsets can make work which certs it's using. Example output without the --dd:

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             Mach-O universal binary with 2 architectures
20364         0x4F8C          Unix path: /usr/lib/dyld
24456         0x5F88          Unix path: /usr/lib/swift/libswiftObjectiveC.dylib
647500        0x9E14C         XML document, version: "1.0"
778255        0xBE00F         mcrypt 2.2 encrypted data, algorithm: blowfish-448, mode: CBC, keymode: 8bit
857010        0xD13B2         XML document, version: "1.0"
863590        0xD2D66         Certificate in DER format (x509 v3), header length: 4, sequence length: 1038
864632        0xD3178         Certificate in DER format (x509 v3), header length: 4, sequence length: 1204
865840        0xD3630         Certificate in DER format (x509 v3), header length: 4, sequence length: 1211
866515        0xD38D3         Certificate in DER format (x509 v3), header length: 4, sequence length: 260
867417        0xD3C59         XML document, version: "1.0"
889036        0xD90CC         Unix path: /usr/lib/dyld
893128        0xDA0C8         Unix path: /usr/lib/swift/libswiftObjectiveC.dylib
1563692       0x17DC2C        XML document, version: "1.0"
1728599       0x1A6057        mcrypt 2.2 encrypted data, algorithm: blowfish-448, mode: CBC, keymode: 8bit
1758178       0x1AD3E2        XML document, version: "1.0"
1764758       0x1AED96        Certificate in DER format (x509 v3), header length: 4, sequence length: 1038
1765800       0x1AF1A8        Certificate in DER format (x509 v3), header length: 4, sequence length: 1204
1767008       0x1AF660        Certificate in DER format (x509 v3), header length: 4, sequence length: 1211
1767683       0x1AF903        Certificate in DER format (x509 v3), header length: 4, sequence length: 260
1768585       0x1AFC89        XML document, version: "1.0"

@wilkyconsultants
Copy link

wilkyconsultants commented Feb 1, 2025

@wilkyconsultants @henrik242 @varenc

Note: This is not as easy in macOS 15+, since the items in ~/Library/Caches/com.apple.findmy.fmipcore/ are now encoded. You can get them more readable in XML with sudo plutil -convert xml1 -o ~/Downloads/Items.txt ./Items.data but it's still an unknown.

And ask Gemini/Ollama/GPT-4 etc about using Darwin's security and plutil. I was able to find my apple user ID and password, which are then Base64 encoded for Basic Auth, in com.apple.account.AppleAccount.cloudkit-token.

Also, try binwalk a copy of the /usr/libexec/fmfd (find my friends daemon) with binwalk --dd='.*' fmfd to extract all to a folder in the same directory, prefixed by an underscore.

Anyone good at reading hex and byte offsets can make work which certs it's using. Example output without the --dd:

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             Mach-O universal binary with 2 architectures
20364         0x4F8C          Unix path: /usr/lib/dyld
24456         0x5F88          Unix path: /usr/lib/swift/libswiftObjectiveC.dylib
647500        0x9E14C         XML document, version: "1.0"
778255        0xBE00F         mcrypt 2.2 encrypted data, algorithm: blowfish-448, mode: CBC, keymode: 8bit
857010        0xD13B2         XML document, version: "1.0"
863590        0xD2D66         Certificate in DER format (x509 v3), header length: 4, sequence length: 1038
864632        0xD3178         Certificate in DER format (x509 v3), header length: 4, sequence length: 1204
865840        0xD3630         Certificate in DER format (x509 v3), header length: 4, sequence length: 1211
866515        0xD38D3         Certificate in DER format (x509 v3), header length: 4, sequence length: 260
867417        0xD3C59         XML document, version: "1.0"
889036        0xD90CC         Unix path: /usr/lib/dyld
893128        0xDA0C8         Unix path: /usr/lib/swift/libswiftObjectiveC.dylib
1563692       0x17DC2C        XML document, version: "1.0"
1728599       0x1A6057        mcrypt 2.2 encrypted data, algorithm: blowfish-448, mode: CBC, keymode: 8bit
1758178       0x1AD3E2        XML document, version: "1.0"
1764758       0x1AED96        Certificate in DER format (x509 v3), header length: 4, sequence length: 1038
1765800       0x1AF1A8        Certificate in DER format (x509 v3), header length: 4, sequence length: 1204
1767008       0x1AF660        Certificate in DER format (x509 v3), header length: 4, sequence length: 1211
1767683       0x1AF903        Certificate in DER format (x509 v3), header length: 4, sequence length: 260
1768585       0x1AFC89        XML document, version: "1.0"

This is a tad over my head but deepseek had some good info.

This is a fascinating and highly technical exploration of macOS internals, specifically related to Apple's Find My system, Airtags, and the security mechanisms in place. Let’s break this down and provide some guidance on how to proceed with the analysis, as well as some insights into the tools and techniques mentioned.

  1. Understanding the Context
    You’re exploring the cache data and binaries related to Apple’s Find My system, including Airtags and Find My Friends. The goal seems to be decoding or extracting useful information from these files, such as:

Decoding the Items.data cache file in macOS 15+.

Extracting Apple user IDs and passwords from com.apple.account.AppleAccount.cloudkit-token.

Analyzing the fmfd (Find My Friends Daemon) binary for certificates and other embedded data.

  1. Decoding Items.data in macOS 15+
    As you mentioned, the Items.data file in ~/Library/Caches/com.apple.findmy.fmipcore/ is now encoded in macOS 15+. Here’s how you can proceed:

Using plutil to Convert to XML
You’ve already identified the correct command to convert the binary .data file to XML:

sudo plutil -convert xml1 -o ~/Downloads/Items.txt ./Items.data
This will give you a more readable XML file, but the structure and content might still be cryptic. You’ll need to analyze the XML to understand the data structure.

Next Steps
Analyze the XML: Look for patterns or identifiable data (e.g., device IDs, timestamps, locations).

Compare with Older Versions: If you have access to an older macOS version, compare the XML structure to see what has changed.

Automate Parsing: Write a script (e.g., in Python) to parse the XML and extract meaningful data.

  1. Extracting Apple User ID and Password
    You mentioned finding your Apple user ID and password in com.apple.account.AppleAccount.cloudkit-token, which is Base64 encoded for Basic Auth. Here’s how to proceed:

Steps to Decode
Locate the File: The file is likely in ~/Library/Accounts/ or a similar directory.

Extract the Token: Use a tool like base64 to decode the token:

echo "BASE64_ENCODED_STRING" | base64 --decode
Analyze the Output: The decoded string should contain your Apple ID and password (or a token). Be cautious with this data, as it’s sensitive.

Security Considerations
Keychain Access: macOS stores sensitive data in the Keychain. You might need to use the security command to access it:

security find-generic-password -a "AppleAccount" -s "cloudkit-token"
Permissions: You’ll need appropriate permissions (e.g., sudo) to access these files.

  1. Analyzing fmfd with binwalk
    You’ve already started analyzing the fmfd binary using binwalk. Here’s how to proceed:

Extracting Embedded Data
Use the --dd option to extract all embedded files:

binwalk --dd='.*' /usr/libexec/fmfd
This will create a folder with extracted files, prefixed by an underscore.

Analyzing Certificates
The binwalk output shows several certificates in DER format. You can use openssl to decode these:

openssl x509 -inform der -in extracted_certificate.der -text
Look for details like issuer, subject, and validity periods to understand their purpose.

Hex and Byte Offset Analysis
Use a hex editor (e.g., xxd, hexdump, or a GUI tool like Hex Fiend) to inspect the binary at specific offsets.

Look for patterns, strings, or headers that indicate embedded data (e.g., XML, certificates, keys).

  1. Tools and Techniques
    Here’s a summary of the tools and techniques you’ll need:

plutil: For converting binary property lists to XML.

base64: For decoding Base64-encoded strings.

security: For accessing macOS Keychain data.

binwalk: For analyzing and extracting embedded data from binaries.

openssl: For decoding and inspecting certificates.

Hex Editors: For manual analysis of binary files.

  1. Ethical and Legal Considerations
    Privacy: Be mindful of the sensitive nature of the data you’re working with (e.g., Apple IDs, passwords, certificates).

Permissions: Ensure you have the right to access and analyze these files, especially on systems you don’t own.

Compliance: Respect Apple’s terms of service and applicable laws when reverse-engineering their software.

  1. Next Steps
    Automate the Process: Write scripts to automate the extraction and decoding of data.

Document Findings: Keep detailed notes on the structure and content of the files you analyze.

Share Knowledge: If you discover something useful, consider sharing it with the community (while respecting privacy and legal boundaries).

This is a complex but rewarding project that combines reverse engineering, macOS internals, and security analysis. Let me know if you’d like help with specific steps or tools!

@elzii
Copy link

elzii commented Feb 4, 2025

@wilkyconsultants

I honestly wouldnt be surprised if deepseek used my posts on other repos Issues and gists. some of those sentences I've said verbatim. See here.

Some good additional insights too. I'll keep investigating.

‼️ ALERT ‼️

If you have a second mac, turn off automatic updates and keep on 14. Sequoia's Image Playground is crap and eats up so much space anyway. Pretty 'meh' release.

@theocat0
Copy link

theocat0 commented Apr 1, 2025

I’ve been following this for a while, and the best solution I found is to buy a $100 Mac and keep it on the last macOS version before Apple started encrypting the Find My cache files. I use it as a dedicated server, running 24/7, to continuously execute the script. That script updates a directory on my iCloud Drive, which syncs seamlessly with my other devices. I then built a very simple iOS app that retrieves and parses this data from the synced folder. The app allows me to select a time and date, and it returns the location history for that period on AppleMaps using the GPX structure generated by the script.

I’d love to add a couple of features to my app, like a heatmap and a paper trail, but I’m still new to Swift. I’ve been following others who are trying to decode the data through reverse engineering, and it seems like Apple is reinforcing the encryption with every update. It’s while to me—this is your own data.....................

@wilkyconsultants
Copy link

I’ve been following this for a while, and the best solution I found is to buy a $100 Mac and keep it on the last macOS version before Apple started encrypting the Find My cache files. I use it as a dedicated server, running 24/7, to continuously execute the script. That script updates a directory on my iCloud Drive, which syncs seamlessly with my other devices. I then built a very simple iOS app that retrieves and parses this data from the synced folder. The app allows me to select a time and date, and it returns the location history for that period on AppleMaps using the GPX structure generated by the script.

I’d love to add a couple of features to my app, like a heatmap and a paper trail, but I’m still new to Swift. I’ve been following others who are trying to decode the data through reverse engineering, and it seems like Apple is reinforcing the encryption with every update. It’s while to me—this is your own data.....................

Yea your right, I have been working on decrypting sequoia Items.data for a while now and can't see how to get the decryption key so giving up for now. I decided to build a bunch of VMs running older Macos version for now (Monterey works great, Sonoma is a bit of a challenge under VirtualBox). Have 5 VMs running under VirtualBox on a Windows PC (16GB memory 2.3Ghz cpu). I am harvesting data on 160 airtags which I feed in to my django server and serve the data via Rest API to my iOS and android app clients. Works well so far. Saves having to buy and maintain a bunch of Macs!

@saikpr
Copy link

saikpr commented Apr 2, 2025

@wilkyconsultants - which setup to do use to create the VM?

@wilkyconsultants
Copy link

@wilkyconsultants - which setup to do use to create the VM?

Most Monterey ISO's on archive.org works fine with VirtualBox with default set up. If anyone manages to get past a boot loop panic on Sonoma 14.3.1 in VirtualBox please let me know. Tried everything..

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment