Another example of using Bluetooth for something it was not intended for

Earlier this week, I wrote about the Bluetooth weaknesses that would allow someone to drive off with your Tesla: How to unlock a Tesla that does not belong to you! – Smart Thinking Solutions Here is a research paper, from UC San Diego, that examines how the cryptographic anonymity that … Continue reading Another example of using Bluetooth for something it was not intended for