Ok … read the articles.
It’s all about hiding the identity of the “annonomous participants” in the locating process.
It starts w/ the Airtag; has no clue as to where it is and very little ability to communicate.
It sends a beacon only intermittantly to save power.
The beacon is received by anyone/everyone in range … but they don’t know - and can’t discover - who the Airtag belongs to.
These “anyones/everyones” forward the AirTag’s ID and their own location to Apple encrypted w/ the AirTag’s public key.
All of this encrypted data goes into a “Big Apple FindMy Pot” but Apple can’t read ANY of the identity or locating info. (Apple can’t inadvertently compromise “data” they never have)
Now YOUR devices know the ID of your tag as well as the date/time.
They essentially reach in to Apple’s pot and pull out data which might be yours.
FindMy then - on your device - successfully decrypts only YOUR tag’s info w/ your PRIVATE key - which resides ONLY on your device. (it’s transferred during the initial pairing process)
Now, you have no way of knowing WHO reported the tag’s location, only that “someone” did.
So, since all “locating” relies on decrypting data with a private key which resides ONLY on your devices, only YOU can see the location.