Can a bonded BLE connection secure communications between two devices and prevent attackers from replaying/reading messages/cmds sent between the two?

I have Device A (Phone) which will pair with Device B (Light Switch) using "Unauthenticated Pairing with Encryption".
My belief was that this level of encryption would be enough to prevent attackers from spoofing either device (M… Continue reading Can a bonded BLE connection secure communications between two devices and prevent attackers from replaying/reading messages/cmds sent between the two?

ESP-Hosted Turns ESP32 Into Linux WiFi/BT Adapter

Showing a Raspberry Pi 4 board connected to an ESP32 devboard using jumper wires for the purposes of this project

While we are used to USB WiFi adapters, embedded devices typically use SDIO WiFi cards, and for good reasons – they’re way more low-power, don’t take up a USB port, …read more Continue reading ESP-Hosted Turns ESP32 Into Linux WiFi/BT Adapter

Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?

Why is step 4 needed? What does it protect in terms of security? Doesn’t the protection arrives from the last step so when Va and Vb (so called TK, Temporary Keys) are compared?
Other thing: I read somewhere that Cb is sent immediately an… Continue reading Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. My goal is to capture and analyze the h… Continue reading How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

Is there any software needed to install from Parrot OS for TP-Link UB500 Nano USB bluetooth 5.0?

I am performing experiment on trying to capture Bluetooth traffic from the fitness device to the Mobile App installed on the Phone.
I am using commands like gatttool, hciconfig, hcitool lescan to scan the Bluetooth device.
I am using Parro… Continue reading Is there any software needed to install from Parrot OS for TP-Link UB500 Nano USB bluetooth 5.0?

Sonos puts personal home theater sound on your head with Ace debut

After years of bubbling online rumors, Sonos has finally revealed its first attempt to break into the overcrowded headphone market with the Ace wireless over-ears – which are clearly looking to dethrone the likes of Sony, Bose and Apple.Continue Readin… Continue reading Sonos puts personal home theater sound on your head with Ace debut

Detecting Malicious Trackers

From Slashdot:

Apple and Google have launched a new industry standard called “Detecting Unwanted Location Trackers” to combat the misuse of Bluetooth trackers for stalking. Starting Monday, iPhone and Android users will receive alerts when an unknown Bluetooth device is detected moving with them. The move comes after numerous cases of trackers like Apple’s AirTags being used for malicious purposes.

Several Bluetooth tag companies have committed to making their future products compatible with the new standard. Apple and Google said they will continue collaborating with the Internet Engineering Task Force to further develop this technology and address the issue of unwanted tracking…

Continue reading Detecting Malicious Trackers

Hackaday Links: May 12, 2024

Hackaday Links Column Banner

Don’t pack your bags for the trip to exoplanet K2-18b quite yet — it turns out that the James Webb Space Telescope may not have detected signs of life there …read more Continue reading Hackaday Links: May 12, 2024