Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Samsung SmartTags & Apple AirTag ⛔ Regional Restrictions #415

Open
Phoenix-999 opened this issue Nov 5, 2024 · 5 comments
Open

Samsung SmartTags & Apple AirTag ⛔ Regional Restrictions #415

Phoenix-999 opened this issue Nov 5, 2024 · 5 comments

Comments

@Phoenix-999
Copy link

Phoenix-999 commented Nov 5, 2024

Hi everyone,
I’d like to bring attention to an issue that may be affecting many users, particularly those in countries with strict sanctions or extensive censorship, like Iran, China, and Russia.

Samsung’s Galaxy SmartTag 2 and Apple’s AirTag are both Bluetooth-based tracking devices that rely on robust ecosystems—Samsung's SmartThings Find and Apple’s Find My network—to help locate lost items. These networks depend on nearby compatible devices to detect and report the trackers’ locations, creating a seamless experience for users.

Screenshot 2024-11-05 at 08 11 11

However, due to regional restrictions, essential features of the SmartThings and Find My apps may be unavailable in these countries, severely impacting the functionality of SmartTags and AirTags. This makes it challenging for these devices to operate as intended.Even when using a VPN, some critical features still don’t work properly. Has anyone else encountered this issue? If so, is there a practical, straightforward solution for regular users who may not have advanced technical skills?

I’m currently exploring this issue and would appreciate any advice or shared experiences.
Thank you all for your time and support!

@wkrp
Copy link
Member

wkrp commented Nov 5, 2024

You could contact the AppCensorship team. They have a tracker for variable availability of app, but I don't know if they track variable feature restrictions in different geographies.

@Phoenix-999
Copy link
Author

You could contact the AppCensorship team. They have a tracker for variable availability of app, but I don't know if they track variable feature restrictions in different geographies.

Thank you 🙏🏾
I will contact them

@Phoenix-999
Copy link
Author

After reaching out to both AppCensorship and Samsung Support, I discovered that they couldn’t provide a solution for activating Samsung Galaxy SmartTags, Apple AirTags, or other Bluetooth tracking devices in regions with restricted internet access. Through further investigation, I identified a workaround that may help anyone facing similar challenges.

Understanding the Issue

Samsung SmartTags and Apple AirTags primarily use Bluetooth Low Energy (BLE) for local communication with smartphones, which doesn’t require internet access. However, their essential features—such as locating a lost item through Samsung’s SmartThings Find or Apple’s Find My network—do rely on internet access to connect the tags to a broader network of devices.

The main obstacle arises during initial setup, which requires a one-time connection to the manufacturer’s central servers. This registration process links your smartphone’s IMEI to the SmartTag or AirTag, establishing ownership, privacy, and security protections. Unfortunately, in regions with strict censorship or sanctions, such as Iran, China, or Russia, these initial connections are often blocked by either the device manufacturers (Samsung or Apple) or local ISPs, preventing activation and limiting the devices' functionality.

Why VPNs Aren't Always Effective

Using a VPN may seem like a straightforward solution. However, many companies, including Samsung and Apple, can detect VPN usage, often blocking IP addresses from known VPN providers or data centers. As a result, traditional VPNs often fail in these cases because companies restrict IPs associated with VPN traffic.

Solution: WARP + FakeDNS & Intercepting DNS Traffic

A more effective workaround involves using FakeDNS to reroute specific DNS requests without affecting the overall internet connection, combined with Warp.

Below is the JSON configuration example:

{
  "dns": {
    "tag": "dns_inbound",  // Tags DNS requests for special routing
    "queryStrategy": "UseIPv4", 
    "servers": [
      "8.8.8.8", 
      "1.1.1.1",  
      {
        "address": "fakedns",  // FakeDNS server to reroute DNS for specified domains
        "domains": [
          "domain:samsung.com",  // Redirects traffic for Samsung domains
          "domain:apple.com"     // Redirects traffic for Apple domains
        ],
        "skipFallback": true  // Prevents fallback to external DNS servers
      }
    ]
  },
  "outbounds": [
    {
      "tag": "direct"  // Direct connection for general traffic
    },
    {
      "tag": "proxy"  // Proxy connection for secured traffic
    },
    {
      "protocol": "dns",
      "tag": "dns-out"  // DNS-specific outbound tag, serving requests via FakeDNS
    },
    {
      "tag": "warp"  // Warp for specialized external routing
    }
  ],
  "routing": {
    "rules": [
      {
        "type": "field",
        "inboundTag": ["dns_inbound"],  // Routes all inbound DNS requests through proxy
        "outboundTag": "proxy"  // Assigns proxy as the outbound for internal DNS
      },
      {
        "type": "field",
        "port": "53",  // Captures all DNS traffic on port 53
        "outboundTag": "dns-out"
      },
      {
        "type": "field",
        "port": "853",  // Blocks DNS over TLS, so the client falls back to unencrypted DNS
        "outboundTag": "blocked"
      },
      {
        "type": "field",
        "outboundTag": "warp",  // Routes detected requests to Warp for specified domains
        "domain": [
          "domain:samsung.com",
          "domain:apple.com"
        ]
      }
    ]
  },
  "fakedns": [
    {
      "ipPool": "198.18.0.0/16",  // Defines IP pool for FakeDNS usage
      "poolSize": 65535  // Sets the size of the IP pool for FakeDNS
    }
  ]
}

To ensure the solution takes effect, don’t forget to clear the cache of your VPN application and restart your smartphone once after making these adjustments.

I hope this information helps others facing similar connectivity issues! ✌🏾

@wkrp
Copy link
Member

wkrp commented Nov 7, 2024

Okay, so the reason Warp works is (1) it avoids local firewall restrictions, and (2) it isn't considered a "VPN" by Apple's and Samsung's anti-VPN detection? Is that correct?

This takes care of the initial registration step. My understanding is that AirTags, etc. work by having lots of devices constantly scan for BLE and report them with their IDs and coordinates back to a central server. Does that part still work in countries that block the apple.com or samsung.com servers? Or would all those other devices have to install some sort of circumvention, too, in order to report the locations of AirTags they see?

@Phoenix-999
Copy link
Author

Phoenix-999 commented Nov 7, 2024

@wkrp

So, Warp works because (1) it avoids local firewalls, and (2) it’s not seen as a “VPN” by Apple’s and Samsung’s anti-VPN detection? Is that right?

Yes, exactly! Through testing with users in Iran, I’ve noticed that Apple and Samsung handle restrictions a bit differently, mostly due to U.S. government sanctions and each company’s unique approach.

With Apple, these sanctions create stricter limits on what features and services Iranian users can access. Apple’s tight control over its hardware and software (aka their “closed ecosystem”) means the Iranian government can’t just block certain Apple features without potentially breaking devices. This is likely why the App Store is still accessible in Iran, even without a VPN.

On the other hand, Android’s open-source nature gives the Iranian government more control. To access the Google Play Store, Iranian Android users usually need a VPN; otherwise, they rely on local app stores like Cafe Bazaar, which offer a government-approved selection. These stores typically block things like VPN apps, dating apps, foreign news, and other restricted content.

From what I understand, devices like AirTags function by relying on a network of devices that continuously scan for BLE (Bluetooth Low Energy) signals and report them, along with their unique IDs and coordinates, to a central server. I’m curious whether this process still functions in countries that block servers like apple.com or samsung.com. Would all devices in such areas need some kind of circumvention setup to report the locations of AirTags they detect?

Through testing and trial-and-error with friends in Iran, I’ve learned that for Samsung's Galaxy SmartTag 2, a one-time connection to the manufacturer’s central servers is required to complete the initial setup after purchasing the device. Without this registration process, which binds the smartphone’s IMEI to the SmartTag (or AirTag), establishing ownership, privacy, and security, certain features may not work as intended. Interestingly, even without registration, basic Bluetooth tracking within a range of about 120 meters still functions, though it is somewhat less accurate. However, tracking beyond Bluetooth and UWB (Ultra-Wideband) range does not work, likely due to the reliance on GPS and other network-based location tracking, which requires that one-time registration with Samsung's central server.

The most surprising discovery is that after completing the one-time initial setup and registration (using a WARP and fake DNS setup), all SmartTag 2 features appear to work seamlessly, even without a VPN! I’m still trying to understand why this is the case, but it’s certainly an intriguing finding. 🤔

For Apple AirTags, their behavior is similar to Samsung’s SmartTag 2. However, I believe some features are restricted or limited on local networks in Iran, primarily due to U.S. government sanctions rather than extensive censorship by the Iranian government. When connected via a VPN set to a European or American location, some regionally restricted features function as expected, provided the VPN remains active. Overall, I believe an internet connection is essential for the final step, reporting the AirTag’s location. Without access to Apple’s servers, any detected location data remains on the phone and does not reach the AirTag’s owner, effectively limiting the network's functionality in such regions.

One thing I still can’t fully understand is how, after completing the one-time registration (which required using WARP and a fake DNS setup), all SmartTag 2 features continue to work correctly even after restarting the phone, without the need for a VPN. I’m still investigating how this is possible, but it’s a curious and unexpected outcome.

In short, Iranian people are caught in the crossfire between the US and European government and the Iranian regime. This situation is like a double-edged sword: on one hand, strict sanctions imposed by the U.S. and European countries make life difficult for ordinary Iranians; on the other, extensive and heavy censorship by the Iranian regime aims to control and silence the population, making daily life even more challenging. It’s truly a bizarre and complex situation.

Steps to Make Samsung SmartTag 2 Work

On the Server Side

  1. Modify VPN Configuration: Adjust the VPN configuration file to route all traffic to samsung.com through WARP.
  2. Intercept DNS Traffic: Configure the server to intercept DNS traffic on port 53, forwarding it to the VPN core’s built-in DNS. Use a fake DNS setup exclusively for samsung.com requests.

On the Client Side

  1. Start fresh by clearing the cache of your VPN application.
  2. Reboot your device to ensure a clean start.
  3. Connect to VPN (with WARP and Fake DNS)
  4. Set up and test the SmartTag’s features. (The one-time registration likely occurs at this stage.)
  5. If all SmartTag 2 features work correctly, disconnect from the VPN.
  6. Clear the cache once more for good measure.
  7. Reboot your device again.

After these steps, you should be able to use all Samsung SmartTag 2 features without needing to reconnect to the VPN.

Please note, I am not an expert in this field; all our findings come from testing, trial, and error. I plan to monitor the situation closely and report back if any strange anomalies arise in the coming days, but so far, the setup appears to be working.

I’m certain there are experts with a clearer and deeper understanding of the technicalities involved. However, we’re here to help as much as we can, sharing what we’ve learned to support those affected by strict sanctions or heavy censorship.✌🏾

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants