Talk:Bluetooth/Archive 2017

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia


External links modified

Hello fellow Wikipedians,

I have just modified 7 external links on Bluetooth. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 18 January 2022).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 08:08, 22 July 2017 (UTC)

Blueborne attack

According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.

Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects. Researchers from Armis Labs who found the exploit were able to use it to create botnets and install ransomware.

Armis video: "Blueborne explained" Sept 12/17

Armis article: A new Bluetooth exploit leaves billions of devices vulnerable

Raymm (talk) 01:00, 13 September 2017 (UTC)

Protocol stack

The section about the protocol stack could probably be better organized by describing the protocols in a per-layer base (similar to OSI model and other articles on the usual Internet protocols), I believe. As it is the section is somewhat confusing, I believe. Since I don't have a very good understanding of this protocol stack in particular I don't think I'm able to do it myself. Saturnalia0 (talk) 21:04, 16 September 2017 (UTC)

Probably best to start with the main article, Bluetooth protocols, if anyone knows how. I only know below HCI William M. Connolley (talk) 21:23, 16 September 2017 (UTC)

over aggressive archiving

This talk page is getting archived too aggressively. And the yearly Archive link box is failing -- years past 2012 are not showing, so recent material is quite inaccessible.-73.61.15.208 (talk) 21:18, 21 December 2017 (UTC)

summary chart

Please add a summary chart of data rates.-73.61.15.208 (talk) 21:20, 21 December 2017 (UTC)