Difference between revisions of "Bluetooth's Complexity Has Become a Security Risk (Q4466)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created claim: quote (P203): Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.)
 
(3 intermediate revisions by the same user not shown)
Property / concerns
 +
Property / concerns: bluetooth data / rank
 +
Normal rank
Property / date
 +
September 2019
Timestamp+2019-09-00T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 month
Before0
After0
Property / date: September 2019 / rank
 +
Normal rank
Property / quote
 +
Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.
Property / quote: Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets. / rank
 +
Normal rank

Latest revision as of 07:19, 14 April 2020

magazine article from 'Wired' published in 2019
Language Label Description Also known as
English
Bluetooth's Complexity Has Become a Security Risk
magazine article from 'Wired' published in 2019

    Statements

    0 references
    0 references
    0 references
    September 2019
    0 references
    Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.
    0 references