The Apple AirTag is for keeping track of your lost things. By crowd sourcing this information, things can be found. This article is a tear-down of the Airtag.
By popping off the outer plastic cover, everything is easily accessible! When tearing this down, the antenna solder point is ripped. So, you'll need to resolder this for it to continue working. What goodies are under the cover?
The first thing of note that is that the SoC is vulnerable to a known attack that allows the debug mode to be turned on. This can be found at
here.
The nRF chip has a NFC and Bluetooth antenna's present. Considering the use case of this device, that makes complete sense.
The SPI flash chip was easily accessible via a website. It has 10 pins but not all of them were accessible. The author used a dead-bug to connect to the proper chips on board. From there, they hooked up a Segger J-Link to talk to the chip.
With the J-Link hooked up, the firmware can be dumped from the device. Apple leaves a nice little easter egg for us to find :)
The author has a Github repo with a detailed breakdown of the device. Additionally, the StackSmashing Youtuber has a series of videos on reversing the firmware of the device and a hardware breakdown.