Introducing Channel Sounding: Secure Fine-Ranging using Bluetooth LE
The release of Bluetooth 6.0 marks a significant milestone in the evolution of Bluetooth technology, introducing Channel Sounding, a groundbreaking feature
The release of Bluetooth 6.0 marks a significant milestone in the evolution of Bluetooth technology, introducing Channel Sounding, a groundbreaking feature
With the rise of smart devices and the Internet of Things (IoT), Bluetooth technology has become an integral part of our daily lives.
Debug Bluetooth LE on iOS with Apple's Packet Logger. Capture HCI commands and events, extract LTK security keys, and decrypt encrypted traffic.
How Bluetooth mesh networking works: managed flooding, publish-subscribe messaging, provisioning, security keys, and relay, proxy, and friend nodes.
NCC Group demonstrated a Bluetooth LE relay attack that bypasses encryption and latency checks to unlock a Tesla Model 3 without the owner's phone nearby.
There are several ways to secure Bluetooth LE device communications. One way is to randomize the MAC address of the device.
The four Bluetooth address types explained: public, random static, resolvable private, and non-resolvable. Plus how Bluetooth LE privacy prevents tracking.
The SweynTooth vulnerabilities affecting Bluetooth LE SoC vendors: types of attacks, impact, and how to protect your devices.
Implementing Over-the-Air Device Firmware Update for nRF52 - Part 3. A step-by-step guide by Novel Bits.
Implementing Over-the-Air Device Firmware Update for nRF52 - Part 2. A step-by-step guide by Novel Bits.
One of the most important and critical features of wirelessly-connected devices is the capability of over-the-air device firmware updates (aka OTA DFU).
Get Started with Bluetooth LE
Download the free Intro to Bluetooth Low Energy eBook — the quickest way to understand the fundamentals.
No spam. Unsubscribe with one click.