this post was submitted on 05 Apr 2024
201 points (96.3% liked)

Android

27897 readers
371 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] theit8514@lemmy.world 71 points 7 months ago* (last edited 7 months ago) (1 children)

I mean it was not too long ago there was a bug which could lead to an unauthenticated RCE against Bluetooth on Android.

https://nvd.nist.gov/vuln/detail/CVE-2022-20345

So yea, reducing surface area of attack when a feature is not needed is kinda important.

[–] mesamunefire@lemmy.world 19 points 7 months ago (2 children)

When we do defcon, Bluetooth is one of the easiest protocols to take control of. It's funny. It's also easy to spoof, easy to mess with, and generally very insecure.

[–] Oha@lemmy.ohaa.xyz 5 points 7 months ago

was at 37c3 and people were constantly spamming BLE pairing requests lmao

[–] sqibkw@lemmy.world 2 points 7 months ago (2 children)

I'm curious, what about Bluetooth makes it insecure? Is it that vendors create insecure implementations, like Android, or is it a human issue like connecting to things by default? I recall the Bluetooth spec being unbelievably complex and verbose, which obviously increases risk and makes it harder to audit, but it doesn't get many updates, and I don't recall seeing many issues with the spec itself. I mean it's not like it's fixing a CVE every quarter like with netty packages.

[–] henfredemars@infosec.pub 4 points 7 months ago

It’s too complicated. Bluetooth is complicated. It tries to do way too much, and not even the experts can implement it in a consistent fashion because different Bluetooth stacks are forced to make assumptions where the specification is unclear.

When you have a large, complex, and poorly designed specification, you’re going to get bugs. The main limiting factor has been the short range of Bluetooth preventing widespread exploitation.

[–] mesamunefire@lemmy.world 2 points 7 months ago (1 children)

Its more complex than I can talk about here in any kind of depth, but it comes down to it being a very old protocol. It has known security issues that are just not fixed as it would break backwards compatibility with a lot of devices. So the same issues that were chosen to not be fixed are still out there. You can, with very little effort, take control of just about any Bluetooth device(or partial). Or at least knock it out if commission.

[–] mesamunefire@lemmy.world 1 points 7 months ago* (last edited 7 months ago)

There's a ton of Honeypot projects. Just the first Google result: https://github.com/andrewmichaelsmith/bluepot