Introducing Channel Sounding: Secure Fine-Ranging using Bluetooth LE
The release of Bluetooth 6.0 marks a significant milestone in the evolution of Bluetooth technology, introducing Channel Sounding, a groundbreaking feature
The release of Bluetooth 6.0 marks a significant milestone in the evolution of Bluetooth technology, introducing Channel Sounding, a groundbreaking feature
With the rise of smart devices and the Internet of Things (IoT), Bluetooth technology has become an integral part of our daily lives.
Learn how to debug and sniff Bluetooth LE communication on iOS devices by capturing HCI commands and events, and extracting security keys for encrypted traffic decryption.
Bluetooth mesh enables many-to-many communication over Bluetooth LE, supporting up to 32,767 nodes. Learn about mesh architecture, provisioning, security, and the different node types.
NCC Group demonstrated a Bluetooth LE relay attack that bypasses encryption and latency checks to unlock a Tesla Model 3 without the owner's phone nearby.
There are several ways to secure Bluetooth LE device communications. One way is to randomize the MAC address of the device.
Understanding how Bluetooth addresses work is crucial for every BLE developer, especially when device privacy is a concern. Learn about the four address types and how BLE privacy protects against tracking.
Learn about the SweynTooth vulnerabilities affecting Bluetooth LE implementations in major SoC vendors, the types of attacks, and how to protect your devices.
Implementing Over-the-Air Device Firmware Update for nRF52 - Part 3. A step-by-step guide by Novel Bits.
Implementing Over-the-Air Device Firmware Update for nRF52 - Part 2. A step-by-step guide by Novel Bits.
One of the most important and critical features of wirelessly-connected devices is the capability of over-the-air device firmware updates (aka OTA DFU).