{"entities":{"Q4466":{"pageid":27587,"ns":120,"title":"Item:Q4466","lastrevid":85758,"modified":"2020-04-14T07:19:37Z","type":"item","id":"Q4466","labels":{"en":{"language":"en","value":"Bluetooth's Complexity Has Become a Security Risk"}},"descriptions":{"en":{"language":"en","value":"magazine article from 'Wired' published in 2019"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":1206,"id":"Q1206"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4466$DD24694D-5F5C-4996-BBA6-932FC8A6112F","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://www.wired.com/story/bluetooth-complex-security-risk/","type":"string"},"datatype":"url"},"type":"statement","id":"Q4466$D5909C63-F325-41B7-B85E-287E3BB4C8B9","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4406,"id":"Q4406"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4466$52c0737a-4b64-65cd-1436-b8910a5b1e3f","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":2587,"id":"Q2587"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4466$709f4fe4-46b4-6697-c27f-fe6dfa875b21","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2019-09-00T00:00:00Z","timezone":0,"before":0,"after":0,"precision":10,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4466$a3fb7e2b-4345-e99a-85a1-cab02e13d9f1","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate\u2014an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4466$14badc9d-48ab-9290-7bc9-69daf6027f6d","rank":"normal"}]},"sitelinks":{}}}}