Analyzing BLE Vulnerabilities and Security Trade-offs
Created using ChatSlide
This coursework investigates BLE vulnerabilities, focusing on spam and device attacks, analyzing beaconing weaknesses and exploitation methods. It employs tools like Flipper Zero and packet sniffers to uncover impacts, critically assessing BLE trust model flaws and privacy threats. The study concludes with user recommendations and insights for improving BLE protocols, ensuring a balance between convenience and security.