Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
CTO Dr. Brett Walkenhorst Explains Bluetooth Key Generation
In this short video, CTO Dr. Brett Walkenhorst describes the key generation process that occurs during Bluetooth connections. He details the difference between legacy pairing and secure connections (SC) pairing, both of which have varying nuances and security implications. For more secure connections, it’s advisable to use the latter of the two options. Even though this may mean limiting the number of devices with which you are communicating, the benefits of SC pairing significantly outweight the risks of legacy pairing if security is paramount for your organization.
Bluetooth Key Generation – Part 2 — Bastille — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1
- Bastille Webinar: Bluetooth Vulnerabilities Part 2 (from this snippet)
- Bastille White Paper: Bluetooth Vulnerabilities