These are chat archives for damon-myers/smartwatch-security

Feb 2016
Feb 29 2016 20:28 An old article, but it gives the GOALS of four categories of attack. Admittedly, it doesn't go much into the HOW, but I can see how the DOS attack could work (Make the ubertooth spam connection requests to drain the mark's batteries).
Damon Myers
Feb 29 2016 21:48
By two weeks:
  • Have your Bluetooth attack formally decided
  • Have an example of an implementation or your own implementation to dissect together