Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector. Vulnerabilities in the way Bluetooth Low Energy is implemented on ...
Researchers from Boston University (BU) have discovered a flaw in the Bluetooth communication protocol that could expose most devices to third-party tracking and leak identifiable data. According to ...