Tagged articles
30 articles
Page 1 of 1
Black & White Path
Black & White Path
May 7, 2026 · Information Security

WhisperPair Vulnerability Enables Remote Hijacking of Millions of Bluetooth Headphones

Security researchers from KU Leuven discovered a critical flaw in Google’s Fast Pair protocol, dubbed WhisperPair, that allows an attacker within 15 seconds and Bluetooth range to silently take over popular headphones such as Sony WH‑1000XM4/5/6, inject audio, eavesdrop, hijack calls, and even track the user’s location.

BluetoothFast PairFirmware update
0 likes · 9 min read
WhisperPair Vulnerability Enables Remote Hijacking of Millions of Bluetooth Headphones
Black & White Path
Black & White Path
May 6, 2026 · Information Security

Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance

Researchers from KTH demonstrated that a simple antenna placed about 1 meter from a Bluetooth device can capture RF emissions containing key‑related leakage, and using machine‑learning‑assisted analysis of roughly 90,000 traces they recover the full AES‑128 key, exposing a practical, non‑contact side‑channel threat and prompting hardware, firmware, and system‑level defenses.

AES-128BluetoothIoT security
0 likes · 7 min read
Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance
Black & White Path
Black & White Path
Apr 10, 2026 · Information Security

How the M6Plus Bluetooth POS Can Reverse‑Hijack Your PC via CVE‑2026‑4583

A deep security analysis reveals that the M6Plus Bluetooth payment terminal suffers from a protocol flaw—CVE‑2026‑4583—that lacks encryption, replay protection, and uses a weak XOR checksum, enabling attackers to spoof the device, inject malicious packets, and gain admin control of paired computers or phones.

BLEBluetoothCVE-2026-4583
0 likes · 7 min read
How the M6Plus Bluetooth POS Can Reverse‑Hijack Your PC via CVE‑2026‑4583
Old Zhang's AI Learning
Old Zhang's AI Learning
Mar 31, 2026 · Artificial Intelligence

Turning a Bluetooth Speaker into a Smart Assistant with Qwen 3.5‑Omni

The author demonstrates a proof‑of‑concept that combines Qwen 3.5‑Omni's real‑time internet search and audio output with a locally hosted voice‑wake‑up model to transform a Bluetooth speaker into an always‑on smart assistant, while noting latency challenges and the potential of a sub‑10B open‑source alternative.

AI integrationBluetoothlarge language model
0 likes · 2 min read
Turning a Bluetooth Speaker into a Smart Assistant with Qwen 3.5‑Omni
Old Meng AI Explorer
Old Meng AI Explorer
Feb 2, 2026 · Operations

Unlock Full AirPods Features on Android & Linux with LibrePods – A Complete Guide

LibrePods is an open‑source project that brings Apple‑locked AirPods functionalities—such as active noise cancellation, ear‑detect auto‑pause, real‑time battery readout, head‑gesture controls, and customizable settings—to Android and Linux devices, offering step‑by‑step installation via Xposed modules or a Linux tray app.

AirPodsAndroidBluetooth
0 likes · 10 min read
Unlock Full AirPods Features on Android & Linux with LibrePods – A Complete Guide
IT Services Circle
IT Services Circle
Dec 14, 2025 · Mobile Development

Unlock AirPods Features on Android & Linux with LibrePods – Open‑Source Reverse‑Engineered Tool

LibrePods is an open‑source project that reverse‑engineers Apple’s proprietary AirPods protocol, enabling Android and Linux users to access native features such as active noise cancellation, ear detection, battery status, and custom transparency modes, with detailed compatibility notes, installation steps, and a public GitHub repository.

AirPodsAndroidBluetooth
0 likes · 5 min read
Unlock AirPods Features on Android & Linux with LibrePods – Open‑Source Reverse‑Engineered Tool
Architect
Architect
Nov 20, 2024 · Fundamentals

Technical Overview of Shared Bike Smart Lock System

This article explains the architecture of shared‑bike smart locks, covering embedded chips, power generation, QR‑code unlocking, payment integration, Bluetooth communication, GPS positioning, and the role of IoT technologies such as 2G, Bluetooth and NB‑IoT in enabling reliable bike sharing services.

BluetoothGPSIoT
0 likes · 5 min read
Technical Overview of Shared Bike Smart Lock System
OPPO Amber Lab
OPPO Amber Lab
Jan 26, 2024 · Information Security

BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits

This article analyzes the BLUFFS vulnerability disclosed at ACM CCS 2023, detailing how the legacy Bluetooth security mechanism (LSC) allows attackers to manipulate authentication and key‑generation parameters, leading to forward‑secrecy and future‑secrecy breaches, and evaluates the impact across devices supporting Bluetooth 4.2‑5.4.

BluetoothLSCSC
0 likes · 27 min read
BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits
php Courses
php Courses
Dec 8, 2023 · Information Security

Critical Bluetooth Vulnerability CVE-2023-45866 Affects Android, iOS, Linux, and macOS

A high‑severity Bluetooth vulnerability (CVE‑2023‑45866) discovered by SkySafe researcher Marc Newlin allows attackers to bypass authentication, pair a fake keyboard, and execute code on Android, iOS, Linux, and macOS devices, with Google’s December Android security update already addressing the issue.

AndroidBluetoothCVE-2023-45866
0 likes · 2 min read
Critical Bluetooth Vulnerability CVE-2023-45866 Affects Android, iOS, Linux, and macOS
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Apr 7, 2023 · Fundamentals

Overview of Bluetooth Technology and Audio Specifications

Bluetooth has progressed from its 1994 origins to a versatile, low‑power platform supporting HFP, A2DP, and the newer BAP audio profiles, mandatory SBC and optional high‑quality codecs such as AAC, apt‑X, LDAC, and the efficient LC3, while LE Audio adds multi‑stream, broadcast capabilities and reduced latency for modern wireless audio experiences.

BLEBluetoothLow Energy
0 likes · 13 min read
Overview of Bluetooth Technology and Audio Specifications
ELab Team
ELab Team
Oct 28, 2022 · Mobile Development

How to Capture Real‑Time Heart Rate Data in a Taro Mini‑Program Using BLE

This tutorial walks through building a Taro mini‑program that connects to a BLE heart‑rate strap, discovers services and characteristics, reads device name and heart‑rate measurements, and handles data conversion, providing code examples and practical insights for mobile developers.

BLEBluetoothHeart Rate
0 likes · 14 min read
How to Capture Real‑Time Heart Rate Data in a Taro Mini‑Program Using BLE
SQB Blog
SQB Blog
Oct 9, 2022 · Fundamentals

Best Wi‑Fi Provisioning Method? AirKiss, SmartConfig, Hotspot, Bluetooth & QR‑Code

This article examines five Wi‑Fi provisioning techniques—AirKiss, SmartConfig, hotspot, Bluetooth, and QR‑code scanning—detailing their processes, technical principles, advantages, and drawbacks, and proposes an enhanced hotspot solution to improve success rates and simplify setup for IoT devices lacking screens or cameras.

BluetoothHotSpotIoT
0 likes · 14 min read
Best Wi‑Fi Provisioning Method? AirKiss, SmartConfig, Hotspot, Bluetooth & QR‑Code
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 30, 2022 · Information Security

Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)

The article examines three Android Bluetooth stack flaws—CVE‑2020‑27024 in the SMP pairing protocol, CVE‑2021‑0918 in GATT notifications, and CVE‑2021‑39805 in L2CAP signaling—detailing their out‑of‑bounds memory errors, underlying code issues, and implications for future Rust‑based stack security.

AndroidBluetoothCVE
0 likes · 15 min read
Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)
OPPO Amber Lab
OPPO Amber Lab
Jun 29, 2022 · Information Security

Inside Android Bluetooth: Three Critical CVEs and Their Exploits

This article examines the complexity of the Bluetooth protocol stack, focusing on Android’s Host layer vulnerabilities, and provides detailed analyses of three critical CVEs—CVE‑2020‑27024 (SMP), CVE‑2021‑0918 (GATT), and CVE‑2021‑39805 (L2CAP)—including protocol overviews, code excerpts, and exploitation paths.

AndroidBluetoothCVE
0 likes · 13 min read
Inside Android Bluetooth: Three Critical CVEs and Their Exploits
HelloTech
HelloTech
Apr 16, 2021 · Fundamentals

Fundamentals of Positioning Technologies: Satellite, Cellular, Wi‑Fi, Bluetooth, Geomagnetic, Inertial, LED, Vision, UWB, and IP

The article explains, in plain language, how modern positioning technologies—including satellite GNSS, cellular triangulation, Wi‑Fi fingerprinting, Bluetooth beacons, geomagnetic field mapping, inertial navigation, LED light codes, vision‑based pose estimation, ultra‑wideband ranging, and IP‑address lookup—determine a device’s location, their principles, typical accuracies, and practical applications.

BluetoothGPSMobile
0 likes · 25 min read
Fundamentals of Positioning Technologies: Satellite, Cellular, Wi‑Fi, Bluetooth, Geomagnetic, Inertial, LED, Vision, UWB, and IP
21CTO
21CTO
Mar 14, 2021 · Information Security

How Apple’s Find My Can Be Exploited: Inside the Bluetooth Location Vulnerabilities

Researchers from Germany’s Darmstadt University uncovered two design flaws in Apple’s Find My Bluetooth location system that enable unauthorized access to a user’s recent location history, explain the offline‑finding mechanism, and detail how macOS vulnerabilities can be exploited to de‑anonymize devices.

AppleBluetoothFind My
0 likes · 5 min read
How Apple’s Find My Can Be Exploited: Inside the Bluetooth Location Vulnerabilities
Tencent Cloud Developer
Tencent Cloud Developer
Nov 5, 2020 · Cloud Computing

Tencent Lianlian IoT Mini‑Program: Device Classification, Lifecycle, and Connectivity Solutions

Tencent’s Lianlian IoT mini‑program unifies device classification, a six‑stage secure lifecycle, Wi‑Fi and Bluetooth provisioning, low‑code control panels, and open‑source SDKs into an end‑to‑end platform that accelerates rapid product launch and cross‑platform front‑end development for smart‑home and enterprise IoT solutions.

BluetoothIoTTencent Lianlian
0 likes · 27 min read
Tencent Lianlian IoT Mini‑Program: Device Classification, Lifecycle, and Connectivity Solutions
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 19, 2020 · Operations

How Bluetooth Beacons Revolutionized Food‑Delivery Rider Tracking

This article explains how Alibaba's aBeacon system uses Bluetooth beacons and mobile sensing to accurately detect delivery riders' arrival and departure at merchants, overcoming GPS drift, multi‑floor challenges, and privacy concerns, thereby improving time estimation, dispatch efficiency, and reducing order‑timeout rates.

BluetoothDelivery LogisticsIndoor Localization
0 likes · 17 min read
How Bluetooth Beacons Revolutionized Food‑Delivery Rider Tracking
Tencent Music Tech Team
Tencent Music Tech Team
Jan 6, 2017 · Fundamentals

Principles and Process of the SBC Audio Codec in Bluetooth Systems

The SBC (Subband Codec) used in Bluetooth headsets compresses PCM audio by splitting the signal into 4 or 8 sub‑bands, allocating bits according to perceptual importance, and encoding with analysis filters, scale factors, APCM and bit‑packing, then decoding reverses the process to reconstruct audio, providing lossy compression across supported sample rates and channel modes.

Audio CompressionBluetoothSBC codec
0 likes · 9 min read
Principles and Process of the SBC Audio Codec in Bluetooth Systems