Comment by amelius
5 hours ago
> We also demonstrate how a compromised Bluetooth peripheral can be abused to attack paired devices, like smartphones, due to their trust relationship with the peripheral.
Can't watch the video now. But I wonder to what extent they can take over a smartphone? Can they make a headphone look like a keyboard/mouse, for example?
Second question: can the whole problem be remedied by installing a firmware update?
No comments yet
Contribute on Hacker News ↗