Can I find out what encryption is used by my Android Bluetooth keyboard?

I’ve got an Android tablet (Samsung Tab S2) and a Bluetooth keyboard (Celicious Tri BK01). I occasionally use the keyboard to enter my password.

Is there any way, in Android, to find out whether the Bluetooth traffic is encrypted? How can… Continue reading Can I find out what encryption is used by my Android Bluetooth keyboard?

Why does GATTattacker Man-in-the-Middle-Attack only work for Bluetooth Low Energy Devices? [on hold]

GATTattacker (https://github.com/securing/gattacker) allows to perform a MitM-attack with two Bluetooth dongles for BLE-devices.
This is done by pairing dongle #1 with a BLE device (e.g. smartlock) and dongle #2 with a smartp… Continue reading Why does GATTattacker Man-in-the-Middle-Attack only work for Bluetooth Low Energy Devices? [on hold]

Non-Nefarious Raspberry Pi Only Looks Like a Hack

We’re going to warn you right up front that this is not a hack. Or at least that’s how it turned out after [LiveOverflow] did some digital forensics on a mysterious device found lurking in a college library. The path he took to come to the conclusion that nothing untoward was going on was interesting and informative, though, as is the ultimate purpose of the unknown artifacts.

As [LiveOverflow] tells us in the video below, he came upon a Reddit thread – of which we can now find no trace – describing a bunch of odd-looking devices stashed behind garbage …read more

Continue reading Non-Nefarious Raspberry Pi Only Looks Like a Hack

Lightsaber Uses Pogo Pins to Make Assembly a Breeze

There was an endless supply of fantastic projects at Supercon this year, but one whose fit and finish really stood out was [Scott]’s lightsaber. If you were walking around and saw someone with a very bright RGB device with a chromed-out handle hanging off their belt it was probably this, though it may have been hard to look at directly. On the outside, the saber looks like a well-polished cosplay prop, and it is! But when Scott quickly broke down the device into component pieces it was apparent that extra care had been put into the assembly of the electronics. …read more

Continue reading Lightsaber Uses Pogo Pins to Make Assembly a Breeze

Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack

Armis today announced the discovery of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) and used in Cisco, Meraki and Aruba wireless access points, called Bleedingbit. If exploited, they allow an unauthent… Continue reading Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack

A Bluetooth Upgrade For An Unusual Set Of Headphones

We will have all picked up something from a junk pile or swap meet in our time that caught our eye not because we needed it but because it looked cool. [Quinn Dunki] did just that with an irresistible set of 1980s air traffic control headphones. What did she do with them? Turn them into a set of Bluetooth headphones of course!

The ‘phones in question are particularly interesting, as they turned out upon inspection to be a two-way radio in disguise. Cracking them open revealed a radio board and a logic board, and what makes them particularly interesting to …read more

Continue reading A Bluetooth Upgrade For An Unusual Set Of Headphones

Which Wireless is Right Wireless?

Back in the early days of Arduino proliferation (and before you ask, yes we realize there was a time before that too), wireless was a strange and foreign beast. IR communication was definitely a thing. And if you had the funds there was this cool technology called ZigBee that was available, often in funny blue house-shaped XBee boards. With even more funds and a stomach for AT commands you could even bolt on a 2G cell radio for unlimited range. WiFi existed too, but connecting it to a hobbyist ecosystem of boards was a little hairier (though maybe not for …read more

Continue reading Which Wireless is Right Wireless?