Bluetooth is a technology that allows for wireless communication between hosts.
Questions tagged [bluetooth]
161 questions
0
votes
1 answer
Security of Bluetooth to stream audio in a highrise apartment building, relative to using Wi-Fi for laptop access to router/modem
My question is about the general security of using Bluetooth in a
highrise apartment building. I am not a software developer, a network
administrator, nor do I work in IT. When needed, I "code", loosely
speaking, but using 4th generation languages…
![](../../users/profiles/169439.webp)
user2153235
- 105
- 6
0
votes
0 answers
Is there any way to find out if a Logitech Unifying Receiver vulnerability was exploited?
Is there any way to find out if any of the vulnerabilities of older Logitech Unifying Receiver firmware was exploited? I'm referring to the vulnerabilities listed here including these.
On GNU/Linux/Debian it can be patched with fwupdmgr update but I…
![](../../users/profiles/139250.webp)
mYnDstrEAm
- 319
- 2
- 17
0
votes
1 answer
Can a wifi Access Point be reconfigured to receive other radio signals?
Say we have a remote transmitter that is not connected to a wifi router (neither wirelessly nor by cable), but which transmits information using electromagnetic waves. Examples include walkie-talkies, mobile phones, and other devices like…
![](../../users/profiles/269913.webp)
RLR
- 1
- 2
0
votes
0 answers
I Received a strange Bluetooth Connection request from one of my own computers on my network
I wish I'd taken a screenshot of the connection request, but it basically was asking to connect to my work laptop and I could either accept or reject the request.
The requesting computer is using an older OS (Mojave - because I still use a 32 bit…
![](../../users/profiles/221002.webp)
hepcat72
- 111
- 3
0
votes
0 answers
What do unkown MAC addresses mean in this context?
I've recently begun learning about Cyber Security related to Bluetooth. I toggled the "Show Bluetooth devices without names" (or something similar) in my phone in developer mode and went to the supermarket. I detected tens of previously undetectable…
![](../../users/profiles/259699.webp)
Basti
- 1
0
votes
0 answers
Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])
Our team is looking to either integrate or develop a physical security solution for a rather large campus.
Requirements:
Ability to either integrate (with reader/electronic lock hardware) from our mobile apps which would allow access control (over…
![](../../users/profiles/196927.webp)
spencer741
- 113
- 5
0
votes
1 answer
Can people hack your iPhone Via Bluetooth if you leave it on?
I live in an apartment complex with lots of people, and oftentimes I would be able to see Bluetooth devices that do not belong to me on my iPhone or MacBook when I search for my Bluetooth device.
Does Apple tell you/ask by default before someone…
![](../../users/profiles/232855.webp)
Ecotistician
- 147
- 6
0
votes
0 answers
Anonimity of Bluetooth tokens
In the context of contact tracing, I have a privacy question.
I have read a few (and "few" is already a bad thing) articles about Bluetooth contact tracing, especially in the context of the Sars-Cov2 pandemic. There are huge privacy concerns in…
![](../../users/profiles/67189.webp)
usr-local-ΕΨΗΕΛΩΝ
- 5,310
- 2
- 17
- 35
0
votes
0 answers
BLE IoT device as platform backdoor for hackers
I have a IoT device that works with BLE and uses a smartphone as a bridge to connect to a digital platform (cloud).
The communication between the IoT device and the platform is based in PKI.
The IoT device has only few privileges and services to…
![](../../users/profiles/231702.webp)
LazyTurtle
- 93
- 5
0
votes
1 answer
Can sending a hidden Text/SMS messages be considered a security issue?
tl;dr: My Toyota Aygo sends Text/SMS messages through Bluetooth and my mobile phone. These messages are delivered to the recipient, but there is no sign of them in my Messages app.
Should I be concern? Is this some kind of security issue?
My car…
![](../../users/profiles/11996.webp)
trejder
- 3,329
- 5
- 23
- 33
0
votes
1 answer
Is it possible to intercept Airdrop data transfer be intercepted?
If I am logged into a school WiFi and I airdrop a photo to someone can the school see what I airdrop? Or what I am searching using their WiFi?
![](../../users/profiles/200759.webp)
Angela1998
- 11
0
votes
1 answer
How can I check if my second hand Apple wireless keyboard contains a keylogger?
I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
![](../../users/profiles/177841.webp)
Ana-Maria
- 9
- 4
0
votes
1 answer
Securely determine my smart phone's position (in front of the door)
I am theoretically thinking about automatically unlocking the house door via smart phone. Without the need to fiddle with the smart phone (opening an app, pressing a button).
There is a commercially available locking/unlocking device which works as…
![](../../users/profiles/8458.webp)
Alex
- 1,207
- 1
- 10
- 9
0
votes
1 answer
Where can I use BLE/NFC U2F device?
Can BLE U2F security keys be used on Chrome for macOS/Windows for any site supporting U2F USB keys as a second factor?
What sites/apps can I use NFC/BLE U2F keys for on NFC-(and BLE-)supporting Android smartphone?
Specifically interested in using…
![](../../users/profiles/104305.webp)
yurkennis
- 151
- 1
- 7
0
votes
0 answers
Is setting a custom bluetooth pin secure enough?
I am working on a project that might be using bluetooth. It is a display board for a school near me, and it will be controlled via a smartphone.
Would setting a custom pin/passkey for the bluetooth chip be enough security to keep away people looking…
![](../../users/profiles/128993.webp)
BarrowWight
- 244
- 1
- 7