Questions tagged [bluetooth]

Bluetooth is a technology that allows for wireless communication between hosts.

161 questions
0
votes
1 answer

Security of Bluetooth to stream audio in a highrise apartment building, relative to using Wi-Fi for laptop access to router/modem

My question is about the general security of using Bluetooth in a highrise apartment building. I am not a software developer, a network administrator, nor do I work in IT. When needed, I "code", loosely speaking, but using 4th generation languages…
user2153235
  • 105
  • 6
0
votes
0 answers

Is there any way to find out if a Logitech Unifying Receiver vulnerability was exploited?

Is there any way to find out if any of the vulnerabilities of older Logitech Unifying Receiver firmware was exploited? I'm referring to the vulnerabilities listed here including these. On GNU/Linux/Debian it can be patched with fwupdmgr update but I…
mYnDstrEAm
  • 319
  • 2
  • 17
0
votes
1 answer

Can a wifi Access Point be reconfigured to receive other radio signals?

Say we have a remote transmitter that is not connected to a wifi router (neither wirelessly nor by cable), but which transmits information using electromagnetic waves. Examples include walkie-talkies, mobile phones, and other devices like…
RLR
  • 1
  • 2
0
votes
0 answers

I Received a strange Bluetooth Connection request from one of my own computers on my network

I wish I'd taken a screenshot of the connection request, but it basically was asking to connect to my work laptop and I could either accept or reject the request. The requesting computer is using an older OS (Mojave - because I still use a 32 bit…
hepcat72
  • 111
  • 3
0
votes
0 answers

What do unkown MAC addresses mean in this context?

I've recently begun learning about Cyber Security related to Bluetooth. I toggled the "Show Bluetooth devices without names" (or something similar) in my phone in developer mode and went to the supermarket. I detected tens of previously undetectable…
Basti
  • 1
0
votes
0 answers

Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])

Our team is looking to either integrate or develop a physical security solution for a rather large campus. Requirements: Ability to either integrate (with reader/electronic lock hardware) from our mobile apps which would allow access control (over…
spencer741
  • 113
  • 5
0
votes
1 answer

Can people hack your iPhone Via Bluetooth if you leave it on?

I live in an apartment complex with lots of people, and oftentimes I would be able to see Bluetooth devices that do not belong to me on my iPhone or MacBook when I search for my Bluetooth device. Does Apple tell you/ask by default before someone…
Ecotistician
  • 147
  • 6
0
votes
0 answers

Anonimity of Bluetooth tokens

In the context of contact tracing, I have a privacy question. I have read a few (and "few" is already a bad thing) articles about Bluetooth contact tracing, especially in the context of the Sars-Cov2 pandemic. There are huge privacy concerns in…
usr-local-ΕΨΗΕΛΩΝ
  • 5,310
  • 2
  • 17
  • 35
0
votes
0 answers

BLE IoT device as platform backdoor for hackers

I have a IoT device that works with BLE and uses a smartphone as a bridge to connect to a digital platform (cloud). The communication between the IoT device and the platform is based in PKI. The IoT device has only few privileges and services to…
LazyTurtle
  • 93
  • 5
0
votes
1 answer

Can sending a hidden Text/SMS messages be considered a security issue?

tl;dr: My Toyota Aygo sends Text/SMS messages through Bluetooth and my mobile phone. These messages are delivered to the recipient, but there is no sign of them in my Messages app. Should I be concern? Is this some kind of security issue? My car…
trejder
  • 3,329
  • 5
  • 23
  • 33
0
votes
1 answer

Is it possible to intercept Airdrop data transfer be intercepted?

If I am logged into a school WiFi and I airdrop a photo to someone can the school see what I airdrop? Or what I am searching using their WiFi?
0
votes
1 answer

How can I check if my second hand Apple wireless keyboard contains a keylogger?

I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
Ana-Maria
  • 9
  • 4
0
votes
1 answer

Securely determine my smart phone's position (in front of the door)

I am theoretically thinking about automatically unlocking the house door via smart phone. Without the need to fiddle with the smart phone (opening an app, pressing a button). There is a commercially available locking/unlocking device which works as…
Alex
  • 1,207
  • 1
  • 10
  • 9
0
votes
1 answer

Where can I use BLE/NFC U2F device?

Can BLE U2F security keys be used on Chrome for macOS/Windows for any site supporting U2F USB keys as a second factor? What sites/apps can I use NFC/BLE U2F keys for on NFC-(and BLE-)supporting Android smartphone? Specifically interested in using…
yurkennis
  • 151
  • 1
  • 7
0
votes
0 answers

Is setting a custom bluetooth pin secure enough?

I am working on a project that might be using bluetooth. It is a display board for a school near me, and it will be controlled via a smartphone. Would setting a custom pin/passkey for the bluetooth chip be enough security to keep away people looking…
BarrowWight
  • 244
  • 1
  • 7
1 2 3
10
11