Bluetooth Low Energy (BLE) and Man-in-the-Middle attacks?
In the “official” Bluetooth blog, they talk about the BLE pairing mechanism, and how during phase 2 (authentication) the exchange of keys are used to protect against MITM attacks. I don’t see how that is possible.
If the at… Continue reading Bluetooth Low Energy (BLE) and Man-in-the-Middle attacks?