Published in


BlueZero: A Major (and Sloppy) Bluetooth Vulnerability … Patch Now!


In the past, wireless security has been compromised by poor standards and weak implementations. WEP, for example, broke almost every rule in the security book [here], and where it could be cracked within hours, and cracked for the whole network. But it is now Bluetooth which is showing some poor implementation standards due to…

Coinmonks is a non-profit Crypto Educational Publication. Follow us on Twitter @coinmonks and Our other project — , Email  —

Recommended from Medium

{UPDATE} Alien Tribe 2 Hack Free Resources Generator

“Hello Alexa, Can You Stop Sending My Conversations To Your Staff” … “I am sorry, Dave, but I…

Policy Overview: Google Meet, Duo, and Hangouts

Howto Utilize The DOL Reading to Get Ready to get a DUI CriminalCase

The Internet was built without an identity layer.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Horst Feistel, The Feistel Cipher and a bit of Rust

Making The Card Game Honest - For The Players and The Dealer: Meet Feldman Verifiable Secret Shares

Homomorphic Subtraction Is So Much More Useful Than Homomorphic Addition?