Bluetooth is a technology that allows for wireless communication between hosts.
Questions tagged [bluetooth]
167 questions
18
votes
2 answers
Is it safe to use Bluetooth headphones?
I am considering acquiring Bluetooth headphones for use with my PC and also iPad. How vulnerable am I with Bluetooth on?
Iexist
- 181
- 1
- 1
- 3
17
votes
1 answer
Security of Bluetooth Low Energy (BLE) link-layer encryption
Is Bluetooth Low Energy (BLE)'s link-layer encryption secure against an attacker who eavesdrops on some random BLE connection between two devices, but has not eavesdropped on the first connection between the two devices?
Background: When the two…
D.W.
- 99,525
- 33
- 275
- 596
13
votes
1 answer
Is Bluetooth's "advertising" mode more secure than "discoverable" mode?
I understand that there are many security issues associated with Bluetooth's "discoverable" mode, and have avoided it where I can. However new features of many systems (e.g. Apple's Handoff/Continuity) rely on having Bluetooth's "advertising" mode…
orome
- 333
- 2
- 9
11
votes
2 answers
How can someone exploit Google's Physical Web?
A thought: The list of URL's is ranked by signal strength. What's stopping someone from increasing the broadcasting strength of their beacons so that they rank first?
What else could be done?
For anyone unfamiliar with the Physical Web:…
Dmitrii Anikin
- 111
- 4
10
votes
1 answer
Difference between Secure Simple Pairing and Secure Connections in Bluetooth?
I would like to know what are the differences between Secure Simple Pairing and Secure Connections in Bluetooth v4.2.
Between BR/EDR legacy, BR/EDR, LE, LE legacy, I don't get it.
Piloux58
- 101
- 1
- 1
- 4
6
votes
1 answer
Is a no-pairing, no-password Bluetooth RFCOMM connection secure?
I have programmatically established a Bluetooth RFCOMM connection between a Desktop PC (client) and a Raspberry Pi (server, Bluetooth 4.1). There is no request for password and no request for pairing during the process. I am sure the connection…
Nick Lee
- 163
- 1
- 3
6
votes
1 answer
Bluetooth Security Mode 2 - is there a regular pairing, as in Mode 1?
I read http://csrc.nist.gov/publications/drafts/800-121/sp800_121_r2_draft.pdf and https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc_id=286439. but I can not find there information about Bluetooth Security Mode 2.
I know that:
Low…
yak
- 123
- 5
5
votes
1 answer
Bluetooth keyboard security
Suppose there is a computer with a Bluetooth keyboard linked to it. The keyboard uses a simple 4-digit PIN. Now, I am able to crack the PIN and then program my own keyboard to use the same PIN. Would it be possible for me to gain access to the…
tpm900
- 171
- 4
5
votes
2 answers
Relay Attacks on Bluetooth LE
Is it possible to perform a relay station attack on Bluetooth LE? For example if I installed an August smart lock or similar on my front door (which uses BLE to communicate with my phone to decide whether or not to unlock the door based on RSSI),…
Hester
- 51
- 2
4
votes
2 answers
Proprietary RF Protocol Security
I've just been reading this article on proprietary RF protocols vs Bluetooth and it seems to be suggesting that the security through obscurity gained through a proprietary protocol is advantageous over the more well-known Bluetooth.
It states…
Oliver.R
- 143
- 4
4
votes
1 answer
BLE 4.2 LE Secure Connection
I am looking at getting the most secure connection between two BLE devices without an I/O capabilities but I am slightly confused by what is going on.
So without I/O capabilities the highest security I can use is Security mode 1 and Security level…
ConfusedCheese
- 143
- 3
3
votes
2 answers
How to prevent sharing my Internet by Bluetooth tethering?
If my neighbor (whom I have allowed to connect to my router) is sharing my internet via Bluetooth tethering, is there a way to prevent anyone else from sharing my internet via his or my Bluetooth without cutting him off?
Eyad
- 33
- 1
- 3
3
votes
2 answers
BLE 5.0 security vs. 4.2
Is there any material improvement/difference in BLE security controls/requirements in BLE 5.0 spec as compared to BLE 4.2 spec?
I skimmed through the BLE bits in the huge Bluetooth 5.0 core spec but that didn't help.
I am aware that there are…
ricky pan
- 31
- 1
- 2
3
votes
1 answer
Bluetooth Low Energy - Relationship between PINs and man-in-the-middle attacks
In the Bluetooth core document, there are various Association Models, I'm trying to understand Numeric Comparison, where both devices are capable of showing a six-digit number (which I will call the PIN, although apparently they don't like that…
Betty Crokker
- 165
- 1
- 1
- 9
2
votes
1 answer
Can a bluetooth mouse be controlled by another bluetooth mouse?
Is it possible to have bluetooth in my machine being controller or (if not interfered) by another bluetooth mouse in nearby computer?
What prevents it? What if they have same pairing code?
I'm not so aware with the bluetooth security. Please can…
ANewGuyInTown
- 121
- 3