Whisper Pair is a vulnerability in most accessories implementing Google Fast Pair.
- Attacker can pair remotely when the accessory is not in pairing mode. Therefore, attacker gets to control the media playback and listen on microphone, when in range, trivially, with zero interaction from the owner.
- There is no way to mitigate this vulnerability. Most accessories do not have a way to disable Google Fast Pair. The only way to stop being vulnerable is a software update for the accessory's firmware that patches it.
- If your accessory is not associated with a Google account, the attacker can associate your accessory with their Google account. This allows you to be physically tracked with Google Find Hub, indefinitely. You may receive a notification "You are being tracked by [Your Accessory]". Do not ignore this; it is not a false positive.
- It is perhaps easier to stalk Apple users this way because they are less likely to already be using Google Find Hub.
If you have a fediverse account, you can quote this note from your own instance. Search https://gaysex.cloud/notes/ahljsm9cddjx02z5 on your instance and quote it. (Note that quoting is not supported in Mastodon.)