17 quotes found
"It is very likely that you are either affected or vulnerable to older attacks."
"The attack exploits the vulnerability on both participating devices simultaneously."
"If any one of them is patched, the attack will not work any more."
"Every Bluetooth pairing performed by vulnerable devices at the presence of the attacker could be compromised."
"An attacker could then eavesdrop all victims' communications, and even send forged requests for information."
"An attacker can ask a phone for the contacts list, read or send SMSes."
"Dial and talk on a compromized connection, and listen in to all Bluetooth conversations."
"Bluetooth Low Energy first introduced in 2010 is intended for use by IoT and low power devices."
"The original Bluetooth is still widely used by audio peripherals."
"They are different in many aspects, Bluetooth Low Energy is largely inspired by the original Bluetooth."
"These differences do not affect our attack."
"On failure the participating devices cancel the pairing procedure, and might notify the user of authentication failure."
"The user may try again immediately afterwards."
"On success of pairing, the attack had certainly been succeeded."
"On success the attack is undetectable by the user."
"When it fails the user may be notified of authentication failure, yet this behavior is implementation dependent."
"In any case current devices cannot distinguish between our attack and a normal authentication failure."