What Armis discovered were primarily weaknesses in standard (not LE) Bluetooth stacks on Windows, iOS and Linux, but a quick look at their white paper raises some questions, and our customers are legitimately concerned.
Could the attack vectors detailed in the Blueborne white paper be used to compromise BLE devices built with the BCM20736?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.