Security News > 2020 > September > New Bluetooth Vulnerability
When, say, an iPhone is getting ready to pair up with Bluetooth-powered device, CTKD's role is to set up two separate authentication keys for that phone: one for a "Bluetooth Low Energy" device, and one for a device using what's known as the "Basic Rate/Enhanced Data Rate" standard.
Different devices require different amounts of data - and battery power - from a phone.
Being able to toggle between the standards needed for Bluetooth devices that take a ton of data, and those that require a bit less is more efficient.
The only way to protect against BLURtooth attacks is to control the environment in which Bluetooth devices are paired, in order to prevent man-in-the-middle attacks, or pairings with rogue devices carried out via social engineering.
When they'll be, they'll most likely be integrated as firmware or operating system updates for Bluetooth capable devices.
News URL
https://www.schneier.com/blog/archives/2020/09/new-bluetooth-vulnerability.html