Difference between revisions of "Bluetooth's Complexity Has Become a Security Risk (Q4466)"
Jump to navigation
Jump to search
(Created claim: concerns (P110): Bluetooth Low Energy (Q4406)) |
(Created claim: quote (P203): Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.) |
||||||||||||||
(3 intermediate revisions by the same user not shown) | |||||||||||||||
Property / concerns | |||||||||||||||
+ | |||||||||||||||
Property / concerns: bluetooth data / rank | |||||||||||||||
+ | Normal rank | ||||||||||||||
Property / date | |||||||||||||||
+ | September 2019
| ||||||||||||||
Property / date: September 2019 / rank | |||||||||||||||
+ | Normal rank | ||||||||||||||
Property / quote | |||||||||||||||
+ | Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets. | ||||||||||||||
Property / quote: Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets. / rank | |||||||||||||||
+ | Normal rank |
Latest revision as of 07:19, 14 April 2020
magazine article from 'Wired' published in 2019
Language | Label | Description | Also known as |
---|---|---|---|
English |
Bluetooth's Complexity Has Become a Security Risk
|
magazine article from 'Wired' published in 2019
|
Statements
September 2019
0 references
Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.
0 references