ESP32 Undocumented Bluetooth Commands: Clearing the Air(espressif.com) Espressif has already provided a formal response to the recently published claims about ESP32 Bluetooth controller serving as a potential “backdoor” or having “undocumented features” that can cause security concerns.
371 points by el_duderino 76 days ago | 111 comments
Turning a Bluetooth device into an Apple AirTag without root privileges(nroottag.github.io) A remote attacker can exploit this vulnerability to turn your device—whether it’s a desktop, smartphone, or smartwatch—into an AirTag-like tracker, enabling the attacker to track your location. How does it work? Over 1.5 billion iPhones could act as free tracking agents for the attacker worldwide.
361 points by deadprogram 132 days ago | 114 comments
The Weird BLE-Lock – Hacking Cloud Locks(nv1t.github.io) tl;dr; My knowledge in Bluetooth LE Communication got quite rusty over time and i wanted to refresh it with an easy target the other day. I wanted to open up the lock with a simple bluetooth command but ended up having access to their entire backend database with a lot of unique users across their entire product lineup.