{"id":16415,"date":"2016-08-08T15:17:26","date_gmt":"2016-08-08T20:17:26","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=16415"},"modified":"2016-08-08T15:21:40","modified_gmt":"2016-08-08T20:21:40","slug":"75-percent-of-bluetooth-smart-locks-can-be-hacked","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=16415","title":{"rendered":"75 Percent of Bluetooth Smart Locks Can Be Hacked"},"content":{"rendered":"<blockquote><p>Twelve out of 16 Bluetooth smart locks examined could be unlocked by a remote attacker, a researcher said at the DEF CON hacker conference.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/www.tomsguide.com\/us\/bluetooth-lock-hacks-defcon2016,news-23129.html\">75 Percent of Bluetooth Smart Locks Can Be Hacked<\/a><\/em><\/p>\n<blockquote><p>The problems didn&#8217;t lie with the Bluetooth Low Energy protocol itself, Rose said, but in the way the locks implemented Bluetooth communications, or with a lock&#8217;s companion smartphone app. Four locks, for example, transmitted their user passwords in plaintext to smartphones, making it easy for anyone with a $100 Bluetooth sniffer to pluck the passwords out of thin air.<\/p><\/blockquote>\n<p>From: <a href=\"http:\/\/xkcd.com\/538\/\">http:\/\/xkcd.com\/538\/<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone aligncenter\" src=\" http:\/\/imgs.xkcd.com\/comics\/security.png \" alt=\"\" width=\"448\" height=\"274\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twelve out of 16 Bluetooth smart locks examined could be unlocked by a remote attacker, a researcher said at the DEF CON hacker conference. Source: 75 Percent of Bluetooth Smart Locks Can Be Hacked The problems didn&#8217;t lie with the &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=16415\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[287],"tags":[1258,1390,1125,143],"class_list":["post-16415","post","type-post","status-publish","format-standard","hentry","category-interfaces","tag-bluetooth","tag-crypto-protocols","tag-exploit-vector","tag-hacks"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16415"}],"version-history":[{"count":3,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16415\/revisions"}],"predecessor-version":[{"id":16419,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16415\/revisions\/16419"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16415"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}