"Every Bluetooth pairing performed by vulnerable devices at the presence of the attacker could be compromised."
Eli Biham

January 1, 1970