I recalled reading about this at the beginning of this month, I haven’t seen any updates on a fix or anything. Figured I’d ponder it with you folks over here.

I have since stopped using most of my Bluetooth devices as a precaution. How real of a threat is this vulnerability? Thanks and sorry if this kind of post is in the wrong spot.

You are viewing a single thread.
View all comments
0 points
*

Well, since I’ve not seen any updates to the BT stack, I’d go with yes.

Stopping using BT seems a bit extreme. What’s your risk?

I only use BT for listening to music/podcasts. I never allow BT connections to have access to contacts, messages, etc. So the only risk (contacts/messages) is pretty well mitigated (for me). For someone who uses BT for contact sync, messages, calls, etc, there may be greater risk.

And IIRC, BLUFFS is a MITM risk (existing connection can be spoofed because of how a key is managed), so only connect to devices you control, don’t allow random connections, leave BT off as much as is reasonable, and perhaps delete/recreate connections occasionally (I think the key gets regenerated on a new connection?).

The most someone would get from my BT is listening to my podcasts.

permalink
report
reply
0 points

Thanks for responding, I don’t necessarily have any risk, but just didn’t want to open myself up to anything since I didn’t quite understand what information could be taken. Better safe than sorry approach you know?

But good to know that in being selective in permissions can mitigate some issues. I worry about a few family members who are not tech literate at all and use rail travel for work that puts them around people in masse and frivolously give permissions to their devices in different vehicles.

permalink
report
parent
reply
0 points

Yea, “frivolous” is the part that’s concerning. Perfect description of how average users approach tech. I’ll be borrowing that!

Guess I need to write up something for family and friends, a good summary of BT risks and how to manage it. Sigh.

permalink
report
parent
reply
0 points

If your family and friends are like most families and friends, even the best write-up will not help against the convenience of not having to press the Bluetooth icon on their phone before activating their headphones.

permalink
report
parent
reply
0 points

Always know your threat scenarios. Depending on your threat scenario, pretty much anything could be a danger or completely harmless.

Bluetooth is a comparatively low-risk interface, since you hardly ever send anything really confidential over it, and since it’s decentralized (only locallized communication), so an attacker needs to be within close range during the attack.

So what’s the worst an attacker could do with Bluetooth? They could sniff the packages (mostly the audio that’s being sent over Bluetooth or mouse clicks and keystrokes if you use a Bluetooth mouse or keyboard) or they could inject the same, e.g. to fake-type something on your devices.

So in reality, there’s nothing special sent over Bluetooth (except maybe contact infos if you actively decide to share them with a Bluetooth device) and the attacker needs to stay within a few meters during the whole attack.

In almost all scenarios, even a completely unencrypted Bluetooth connection will only cause very limited potential trouble.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 5.1K

    Posts

  • 91K

    Comments