Such an attacker can then passively intercept and decrypt all device messages, and/or forge and inject malicious messages.https://www.schneier.com/blog/archives/2018/07/major_bluetooth.html
No comments:
Post a Comment