the protocols on how Bluetooth is handled is far different than the ones how wifi is handled, same as NFC and cellular. to equate all their security as "the same" is very dismissive, especially comparing to wifi and cellular which typically arent direct device to device connections.
nfc dodges its problems because its for the most part off until you open an app that uses it, so its already doing what a user should be doing for security reasons.
Nah, my sentiment is more like if man can make it man can break it...imei cloning, arp poisoning, relay attack...anything broadcast willy nilly everywhere is as much of a security risk if you are concerned about bluetooth exploits...
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.
So is literally any communication standard on your phone...just turn off wifi, nfc, cellular network and Bluetooth then you'll be safe
the protocols on how Bluetooth is handled is far different than the ones how wifi is handled, same as NFC and cellular. to equate all their security as "the same" is very dismissive, especially comparing to wifi and cellular which typically arent direct device to device connections.
nfc dodges its problems because its for the most part off until you open an app that uses it, so its already doing what a user should be doing for security reasons.
Nah, my sentiment is more like if man can make it man can break it...imei cloning, arp poisoning, relay attack...anything broadcast willy nilly everywhere is as much of a security risk if you are concerned about bluetooth exploits...
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.