Rikki Don't Lose That Bluetooth Device

Discussion in 'News Aggregator' started by Packet Storm, 11 Jul 2018.

  1. Packet Storm

    Packet Storm Guest

    In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

    Continue reading...
     

Share This Page

Loading...