Questions tagged [bluetooth]

Bluetooth is a technology that allows for wireless communication between hosts.

167 questions
18
votes
2 answers

Is it safe to use Bluetooth headphones?

I am considering acquiring Bluetooth headphones for use with my PC and also iPad. How vulnerable am I with Bluetooth on?
Iexist
  • 181
  • 1
  • 1
  • 3
17
votes
1 answer

Security of Bluetooth Low Energy (BLE) link-layer encryption

Is Bluetooth Low Energy (BLE)'s link-layer encryption secure against an attacker who eavesdrops on some random BLE connection between two devices, but has not eavesdropped on the first connection between the two devices? Background: When the two…
D.W.
  • 99,525
  • 33
  • 275
  • 596
13
votes
1 answer

Is Bluetooth's "advertising" mode more secure than "discoverable" mode?

I understand that there are many security issues associated with Bluetooth's "discoverable" mode, and have avoided it where I can. However new features of many systems (e.g. Apple's Handoff/Continuity) rely on having Bluetooth's "advertising" mode…
orome
  • 333
  • 2
  • 9
11
votes
2 answers

How can someone exploit Google's Physical Web?

A thought: The list of URL's is ranked by signal strength. What's stopping someone from increasing the broadcasting strength of their beacons so that they rank first? What else could be done? For anyone unfamiliar with the Physical Web:…
10
votes
1 answer

Difference between Secure Simple Pairing and Secure Connections in Bluetooth?

I would like to know what are the differences between Secure Simple Pairing and Secure Connections in Bluetooth v4.2. Between BR/EDR legacy, BR/EDR, LE, LE legacy, I don't get it.
Piloux58
  • 101
  • 1
  • 1
  • 4
6
votes
1 answer

Is a no-pairing, no-password Bluetooth RFCOMM connection secure?

I have programmatically established a Bluetooth RFCOMM connection between a Desktop PC (client) and a Raspberry Pi (server, Bluetooth 4.1). There is no request for password and no request for pairing during the process. I am sure the connection…
Nick Lee
  • 163
  • 1
  • 3
6
votes
1 answer

Bluetooth Security Mode 2 - is there a regular pairing, as in Mode 1?

I read http://csrc.nist.gov/publications/drafts/800-121/sp800_121_r2_draft.pdf and https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc_id=286439. but I can not find there information about Bluetooth Security Mode 2. I know that: Low…
yak
  • 123
  • 5
5
votes
1 answer

Bluetooth keyboard security

Suppose there is a computer with a Bluetooth keyboard linked to it. The keyboard uses a simple 4-digit PIN. Now, I am able to crack the PIN and then program my own keyboard to use the same PIN. Would it be possible for me to gain access to the…
tpm900
  • 171
  • 4
5
votes
2 answers

Relay Attacks on Bluetooth LE

Is it possible to perform a relay station attack on Bluetooth LE? For example if I installed an August smart lock or similar on my front door (which uses BLE to communicate with my phone to decide whether or not to unlock the door based on RSSI),…
Hester
  • 51
  • 2
4
votes
2 answers

Proprietary RF Protocol Security

I've just been reading this article on proprietary RF protocols vs Bluetooth and it seems to be suggesting that the security through obscurity gained through a proprietary protocol is advantageous over the more well-known Bluetooth. It states…
Oliver.R
  • 143
  • 4
4
votes
1 answer

BLE 4.2 LE Secure Connection

I am looking at getting the most secure connection between two BLE devices without an I/O capabilities but I am slightly confused by what is going on. So without I/O capabilities the highest security I can use is Security mode 1 and Security level…
3
votes
2 answers

How to prevent sharing my Internet by Bluetooth tethering?

If my neighbor (whom I have allowed to connect to my router) is sharing my internet via Bluetooth tethering, is there a way to prevent anyone else from sharing my internet via his or my Bluetooth without cutting him off?
Eyad
  • 33
  • 1
  • 3
3
votes
2 answers

BLE 5.0 security vs. 4.2

Is there any material improvement/difference in BLE security controls/requirements in BLE 5.0 spec as compared to BLE 4.2 spec? I skimmed through the BLE bits in the huge Bluetooth 5.0 core spec but that didn't help. I am aware that there are…
ricky pan
  • 31
  • 1
  • 2
3
votes
1 answer

Bluetooth Low Energy - Relationship between PINs and man-in-the-middle attacks

In the Bluetooth core document, there are various Association Models, I'm trying to understand Numeric Comparison, where both devices are capable of showing a six-digit number (which I will call the PIN, although apparently they don't like that…
Betty Crokker
  • 165
  • 1
  • 1
  • 9
2
votes
1 answer

Can a bluetooth mouse be controlled by another bluetooth mouse?

Is it possible to have bluetooth in my machine being controller or (if not interfered) by another bluetooth mouse in nearby computer? What prevents it? What if they have same pairing code? I'm not so aware with the bluetooth security. Please can…
1
2 3