Murcielago The authors forgot to link to the actual paper, which is here [PDF]: https://cs.gmu.edu/~qzeng2/papers/2025-security-nrootgag.pdf
Also, this comment by Dan Goodin of Arstechnica is interesting: https://infosec.exchange/@dangoodin/114077443305730420
The new "nRootTag" attack that transforms phones, computers and IoT devices into AirTags that can be tracked over Apple Find My sounds newsworthy at first blush. But it isn't until page 5 of the research paper that we learn the attack requires the successful infection of one device if it's running Linux and two devices when running Android or Windows.