Comment by K0balt
1 month ago
This is good research, but a bad headline. As an attack vector, this requires physical access and could already be done by other means in almost all cases. So, “undocumented commands found in common Bluetooth chip” would be a better headline.
I take this stuff might be interesting in hardware hackery way. Like legitimate way to get extra things out of existing hardware.
I was thinking the same thing, maybe for downloading locked firmware. Now that we know we can use LLMs to clean-room just about any code, extracting firmware from devices just because much more valuable.