Nah, my sentiment is more like if man can make it man can break it...imei cloning, arp poisoning, relay attack...anything broadcast willy nilly everywhere is as much of a security risk if you are concerned about bluetooth exploits...
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.
Nah, my sentiment is more like if man can make it man can break it...imei cloning, arp poisoning, relay attack...anything broadcast willy nilly everywhere is as much of a security risk if you are concerned about bluetooth exploits...
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.