These are chat archives for damon-myers/smartwatch-security

29th
Feb 2016
jasholt
@jasholt
Feb 29 2016 20:28
https://gcn.com/articles/2005/07/20/a-menu-of-bluetooth-attacks.aspx An old article, but it gives the GOALS of four categories of attack. Admittedly, it doesn't go much into the HOW, but I can see how the DOS attack could work (Make the ubertooth spam connection requests to drain the mark's batteries).
Damon Myers
@damon-myers
Feb 29 2016 21:48
By two weeks:
  • Have your Bluetooth attack formally decided
  • Have an example of an implementation or your own implementation to dissect together