(Q4466)

From Wikibase Personal data
Jump to navigation Jump to search

Statements

0 references
0 references
0 references
September 2019
0 references
Fundamentally, both Bluetooth and BLE open up a channel for two devices to communicate—an extremely useful arrangement, but one that also opens the door for dangerous interactions. Without strong cryptographic authentication checks, malicious third parties can use Bluetooth and BLE to connect to a device they shouldn't have access to, or trick targets.
0 references