| ▲ | amelius 2 hours ago | |
> We also demonstrate how a compromised Bluetooth peripheral can be abused to attack paired devices, like smartphones, due to their trust relationship with the peripheral. Can't watch the video now. But I wonder to what extent they can take over a smartphone? Can they make a headphone look like a keyboard/mouse, for example? Second question: can the whole problem be remedied by installing a firmware update? | ||