A new Bluetooth security paper Bluetooth Impersonation AttackS (BIAS) shows how flaws in the Bluetooth spec can be used to perform a variant of
The new KNOB attack exploits a flaw in the key negotiation protocol for classic connections and lets an attacker reduce the effective key length
Re-evaluating LE Legacy Pairing, we realized that customers could miss to set two security keys (ER + IR) to persistent random values, which
For quite some time, I’ve envied people that made their own PCB boards to solve simple connectivity problems instead of using solderless
When a Bluetooth use case doesn’t work as expected, it’s often very helpful to analyze the Bluetooth communication. If one side is
For two Bluetooth devices to communicate securely, pairing is required to authenticate and encrypt the communication between them by entering a
After a small detour handling Cross-Platform Console Input, we’re back and got audio streaming via A2DP to work in both directions on the
After we got BTstack running on the STM32 F4 Discovery board, next on our plan was to play music received by A2DP via the built-in Cypress Audio
In our first post we’ll describe, in a (mostly) linear fashion, how we ported BTstack to the STM32 platform. The steps we took to port
- 1
- 2