I recalled reading about this at the beginning of this month, I haven’t seen any updates on a fix or anything. Figured I’d ponder it with you folks over here.
I have since stopped using most of my Bluetooth devices as a precaution. How real of a threat is this vulnerability? Thanks and sorry if this kind of post is in the wrong spot.
Well, since I’ve not seen any updates to the BT stack, I’d go with yes.
Stopping using BT seems a bit extreme. What’s your risk?
I only use BT for listening to music/podcasts. I never allow BT connections to have access to contacts, messages, etc. So the only risk (contacts/messages) is pretty well mitigated (for me). For someone who uses BT for contact sync, messages, calls, etc, there may be greater risk.
And IIRC, BLUFFS is a MITM risk (existing connection can be spoofed because of how a key is managed), so only connect to devices you control, don’t allow random connections, leave BT off as much as is reasonable, and perhaps delete/recreate connections occasionally (I think the key gets regenerated on a new connection?).
The most someone would get from my BT is listening to my podcasts.
Thanks for responding, I don’t necessarily have any risk, but just didn’t want to open myself up to anything since I didn’t quite understand what information could be taken. Better safe than sorry approach you know?
But good to know that in being selective in permissions can mitigate some issues. I worry about a few family members who are not tech literate at all and use rail travel for work that puts them around people in masse and frivolously give permissions to their devices in different vehicles.
Yea, “frivolous” is the part that’s concerning. Perfect description of how average users approach tech. I’ll be borrowing that!
Guess I need to write up something for family and friends, a good summary of BT risks and how to manage it. Sigh.
Always know your threat scenarios. Depending on your threat scenario, pretty much anything could be a danger or completely harmless.
Bluetooth is a comparatively low-risk interface, since you hardly ever send anything really confidential over it, and since it’s decentralized (only locallized communication), so an attacker needs to be within close range during the attack.
So what’s the worst an attacker could do with Bluetooth? They could sniff the packages (mostly the audio that’s being sent over Bluetooth or mouse clicks and keystrokes if you use a Bluetooth mouse or keyboard) or they could inject the same, e.g. to fake-type something on your devices.
So in reality, there’s nothing special sent over Bluetooth (except maybe contact infos if you actively decide to share them with a Bluetooth device) and the attacker needs to stay within a few meters during the whole attack.
In almost all scenarios, even a completely unencrypted Bluetooth connection will only cause very limited potential trouble.