Tagged articles
9 articles
Page 1 of 1
Black & White Path
Black & White Path
May 14, 2026 · Information Security

WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices

WireTapper is an open-source OSINT/SIGINT platform that passively scans and visualizes every nearby wireless device—from Wi-Fi and Bluetooth to CCTV and vehicle RF—using a privacy-preserving k-anonymous query, integrates multiple external APIs, and offers a quick two-step deployment with a sleek web UI.

BLEOSINTSIGINT
0 likes · 4 min read
WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices
Goodme Frontend Team
Goodme Frontend Team
Apr 27, 2026 · Mobile Development

Exploring BLE Printing in DingTalk Mini Programs: Implementation and Best Practices

This article provides a detailed engineering analysis of using Bluetooth Low Energy (BLE) within DingTalk mini programs to drive portable thermal printers, covering why BLE is chosen over classic Bluetooth, the GATT communication model, connection lifecycle management, ESC/POS command construction, packet splitting for the 20‑byte BLE limit, and practical image‑printing techniques, all illustrated with code examples and step‑by‑step guidance.

BLEDingTalkESC/POS
0 likes · 46 min read
Exploring BLE Printing in DingTalk Mini Programs: Implementation and Best Practices
ShiZhen AI
ShiZhen AI
Apr 19, 2026 · Artificial Intelligence

Meet the Claude Desktop Buddy: A BLE‑Powered Hardware Pet That Handles Code Approvals

Anthropic’s newly released BLE API lets developers embed Claude Code’s approval workflow into ESP32‑based devices, and within two days the community has produced several hardware adaptations—including M5StickC, X‑Knob, Cardputer, and Raspberry Pi Pico W—turning code approvals into tangible, customizable interactions.

AI CodingBLEClaude Desktop
0 likes · 9 min read
Meet the Claude Desktop Buddy: A BLE‑Powered Hardware Pet That Handles Code Approvals
Black & White Path
Black & White Path
Apr 10, 2026 · Information Security

How the M6Plus Bluetooth POS Can Reverse‑Hijack Your PC via CVE‑2026‑4583

A deep security analysis reveals that the M6Plus Bluetooth payment terminal suffers from a protocol flaw—CVE‑2026‑4583—that lacks encryption, replay protection, and uses a weak XOR checksum, enabling attackers to spoof the device, inject malicious packets, and gain admin control of paired computers or phones.

BLEBluetoothCVE-2026-4583
0 likes · 7 min read
How the M6Plus Bluetooth POS Can Reverse‑Hijack Your PC via CVE‑2026‑4583
Goodme Frontend Team
Goodme Frontend Team
Oct 21, 2024 · Mobile Development

Mastering BLE on Mobile: From Basics to Advanced Data Handling

This article explains Bluetooth Low Energy fundamentals, compares classic and BLE, describes BLE mesh networking, provides a complete bleno example for peripheral simulation, and details advertising, scanning, connection flow, MTU negotiation, fragmentation, and sticky‑packet handling on Android and iOS.

AndroidBLEBleno
0 likes · 13 min read
Mastering BLE on Mobile: From Basics to Advanced Data Handling
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Apr 7, 2023 · Fundamentals

Overview of Bluetooth Technology and Audio Specifications

Bluetooth has progressed from its 1994 origins to a versatile, low‑power platform supporting HFP, A2DP, and the newer BAP audio profiles, mandatory SBC and optional high‑quality codecs such as AAC, apt‑X, LDAC, and the efficient LC3, while LE Audio adds multi‑stream, broadcast capabilities and reduced latency for modern wireless audio experiences.

BLEBluetoothLow Energy
0 likes · 13 min read
Overview of Bluetooth Technology and Audio Specifications
ELab Team
ELab Team
Oct 28, 2022 · Mobile Development

How to Capture Real‑Time Heart Rate Data in a Taro Mini‑Program Using BLE

This tutorial walks through building a Taro mini‑program that connects to a BLE heart‑rate strap, discovers services and characteristics, reads device name and heart‑rate measurements, and handles data conversion, providing code examples and practical insights for mobile developers.

BLEBluetoothHeart Rate
0 likes · 14 min read
How to Capture Real‑Time Heart Rate Data in a Taro Mini‑Program Using BLE
OPPO Amber Lab
OPPO Amber Lab
Aug 3, 2021 · Information Security

Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices

This article traces the evolution of Bluetooth Low Energy (BLE), explains why it dominates modern IoT, and examines three major security threat vectors—protocol flaws, supply‑chain vulnerabilities, and product design weaknesses—while offering concrete mitigation strategies and reference resources.

BLEBluetooth Low EnergyIoT security
0 likes · 13 min read
Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices