The Bluetooth SIG unveils the new
Core Specification v2.1 + EDR.
It includes a brand new pairing protocol, replacing the one we
showed to be flawed.
- Read my opinion about this on my CIO Advice Blog.
In 2008 it turned out that there are issues with Bluetooth 2.1 authentication
as well: Check out Lindell's
Black Hat 2008 presentation.
On the other hand Lindell also shows in this
that some of the Bluetooth authentication modes are actually provably secure.
So there is still much good in Bluetooth 2.1.
Article in the Wall Street Journal, by Keith J. Winstein,
June 16, 2005; Page B1. Registration required.
Here is a scan from the European edition,
and the text from the Online edition.
about our work (1-minute video).
The Chronicle: Wired Campus, by Matthew Kalman, March 29, 2007.
Article in New Scientist,
by Celeste Biever, 03 June 2005
Bruce Schneier's weblog
Article in SMBtoday
by Izhar Gavish (Hebrew), 14 June 2005. Registration required.
Discussion on slashdot
Security Focus advisory
One of our suggestions has been called BlueDump and was
designated as wireless vulnerability
Yaniv and Avishai at MobiSys'05