Questions tagged [bluetooth]

Bluetooth is a technology that allows for wireless communication between hosts.

161 questions
5
votes
2 answers

What is BlueBorne and how to protect myself?

Since this is a hot-topic this week, I'm looking for a canonical answer: What is the BlueBorne Bluetooth vulnerability? How to protect myself?
Mike Ounsworth
  • 57,707
  • 21
  • 150
  • 207
5
votes
1 answer

Bluetooth keyboard security

Suppose there is a computer with a Bluetooth keyboard linked to it. The keyboard uses a simple 4-digit PIN. Now, I am able to crack the PIN and then program my own keyboard to use the same PIN. Would it be possible for me to gain access to the…
tpm900
  • 171
  • 4
5
votes
2 answers

Relay Attacks on Bluetooth LE

Is it possible to perform a relay station attack on Bluetooth LE? For example if I installed an August smart lock or similar on my front door (which uses BLE to communicate with my phone to decide whether or not to unlock the door based on RSSI),…
Hester
  • 51
  • 2
4
votes
1 answer

Arduino to Android secure bluetooth connection

I'm using an Arduino Uno and a nRF8001 board from Adafruit to connect to an Android phone over bluetooth. I will be using it to lock and unlock a lock and I need to make sure only verified devices are able to initiate the locking and unlocking. I've…
4
votes
2 answers

Can neighbour hear my bluetooth headset?

I'd like to buy a wireless bluetooth headset to not disturbing others by my TV sound but I'm wondering how private the transmission will be? Can a neighbour with a bluetooth headset hear my TV's bluetooth emission through a wooden wall? If so, how…
Milkyway
  • 165
  • 1
  • 4
4
votes
2 answers

Proprietary RF Protocol Security

I've just been reading this article on proprietary RF protocols vs Bluetooth and it seems to be suggesting that the security through obscurity gained through a proprietary protocol is advantageous over the more well-known Bluetooth. It states…
Oliver.R
  • 143
  • 4
4
votes
1 answer

BLE 4.2 LE Secure Connection

I am looking at getting the most secure connection between two BLE devices without an I/O capabilities but I am slightly confused by what is going on. So without I/O capabilities the highest security I can use is Security mode 1 and Security level…
4
votes
1 answer

Is it risky to use an untrusted keyboard?

Suppose you're buying a new keyboard (say USB-wired, but consider Bluetooth connected as well) from Ebay. Is it risky to use that keyboard in a sense that it could be more than just a keyboard? Thinking of USB rubber ducky (see also here) which is a…
a_guest
  • 141
  • 2
4
votes
1 answer

Is Apple compromising network security with its default settings, which allow users to provide network credentials to other users with one tap?

This article summarizes the functionality that has been recently added to Apple devices. My colleagues have expressed concerns about this feature eroding network security at the office. My questions: Should we consider this a security risk? Only…
Steven Lu
  • 977
  • 2
  • 12
  • 13
4
votes
1 answer

Bluetooth Low Energy (BLE) and Man-in-the-Middle attacks?

In the "official" Bluetooth blog, they talk about the BLE pairing mechanism, and how during phase 2 (authentication) the exchange of keys are used to protect against MITM attacks. I don't see how that is possible. If the attacker creates a device…
Betty Crokker
  • 155
  • 1
  • 8
4
votes
1 answer

What algorithms are used in Bluetooth Secure Simple Pairing LE for authentication, key generation and encryption?

From another question in SO, I got to know a lot about authentication, key generation and encryption algorithms available in Bluetooth BR/EDR: I also read the official specification, and it says that LE Secure Connections and BR/EDR Secure…
darias
  • 407
  • 1
  • 5
  • 8
4
votes
1 answer

Is it possible to spoof a paired Bluetooth device?

I'm thinking about creating a physical lock, where the keys would simply be paired Bluetooth devices, but I'm concerned about the potential (in)security. I would like to have a Bluetooth 2.1 module constantly scan for paired devices and when one is…
IAmHello
  • 43
  • 1
  • 1
  • 4
4
votes
0 answers

How to differentiate between encrypted and unencrypted Bluetooth traffic while using Wireshark?

I captured Bluetooth traffic between a master vault Bluetooth smart padlock and an iPhone 6s. This was done using a Bluetooth sniffer and the captured traffic was stored to a pcap file. Analysing it on Wireshark displays all the packets transferred…
Antonio
  • 41
  • 5
4
votes
1 answer

What things can the other person see about my phone when I pair it using bluetooth?

I need to know some correct information about bluetooth pairing technology. What are the things which becomes visible to the person about my phone when I'm using bluetooth from my phone and pairing it with another phone? I mean what information…
user113653
  • 41
  • 1
  • 1
  • 2
3
votes
2 answers

How to prevent sharing my Internet by Bluetooth tethering?

If my neighbor (whom I have allowed to connect to my router) is sharing my internet via Bluetooth tethering, is there a way to prevent anyone else from sharing my internet via his or my Bluetooth without cutting him off?
Eyad
  • 33
  • 1
  • 3
1 2
3
10 11