bluetooth protocol

Talk:Bluetooth

From Wikipedia, the free encyclopedia
Former good article nomineeBluetooth was a Engineering and technology good articles nominee, but did not meet the good article criteria at the time. There are suggestions below for improving the article. Once these issues have been addressed, the article can be renominated. Editors may also seek a reassessment of the decision if they believe there was a mistake.
April 15, 2012Good article nomineeNot listed

Versions chart[edit]

It's confusing to try to understand which features are new/required/optional in each version. Maybe a table/chart would make it easier to follow?

Wi-Fi[edit]

"Bluetooth high speed is based on Wi-Fi" In what sense? Do both devices need to be connected to the same Wi-Fi router? Do they form an ad-hoc network? Can a computer talk to a Wi-Fi router and a bluetooth HS device at the same time, using the same radio?

Blueborne attack[edit]

According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.
Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects. Researchers from Armis Labs who found the exploit were able to use it to create botnets and install ransomware.
Raymm (talk) 01:00, 13 September 2017 (UTC)

Protocol stack[edit]

The section about the protocol stack could probably be better organized by describing the protocols in a per-layer base (similar to OSI model and other articles on the usual Internet protocols), I believe. As it is the section is somewhat confusing, I believe. Since I don't have a very good understanding of this protocol stack in particular I don't think I'm able to do it myself. Saturnalia0 (talk) 21:04, 16 September 2017 (UTC)

Comments

Popular posts from this blog

MDU RANK LIST IS OUT

brain monitoring Electroencephalography (EEG)