bluetooth protocol
Talk:Bluetooth
![]() |
There is a request, submitted by Lionsdude148, for an audio version of this article to be created. For further information, see WikiProject Spoken Wikipedia.
The rationale behind the request is: "Important".
|
This is the talk page for discussing improvements to the Bluetooth article. This is not a forum for general discussion of the article's subject. | |||
|
Article policies
|
![]() | Bluetooth was a Engineering and technology good articles nominee, but did not meet the good article criteria at the time. There are suggestions below for improving the article. Once these issues have been addressed, the article can be renominated. Editors may also seek a reassessment of the decision if they believe there was a mistake. | |||
|
![]() | [hide] This article is of interest to the following WikiProjects: | |||||||||
|
![]() Archives |
---|
Threads older than 3 months may be archived by MiszaBot I. |
Contents
[hide]Versions chart[edit]
It's confusing to try to understand which features are new/required/optional in each version. Maybe a table/chart would make it easier to follow?
Wi-Fi[edit]
"Bluetooth high speed is based on Wi-Fi" In what sense? Do both devices need to be connected to the same Wi-Fi router? Do they form an ad-hoc network? Can a computer talk to a Wi-Fi router and a bluetooth HS device at the same time, using the same radio?
Blueborne attack[edit]
According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.
Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects. Researchers from Armis Labs who found the exploit were able to use it to create botnets and install ransomware.
Protocol stack[edit]
The section about the protocol stack could probably be better organized by describing the protocols in a per-layer base (similar to OSI model and other articles on the usual Internet protocols), I believe. As it is the section is somewhat confusing, I believe. Since I don't have a very good understanding of this protocol stack in particular I don't think I'm able to do it myself. Saturnalia0 (talk) 21:04, 16 September 2017 (UTC)
Comments
Post a Comment