What’s more, the security notice from the Bluetooth Special Interest Group said: For an attack to be successful, an attacking device would need to be within wireless range of two vulnerable Bluetooth devices that were establishing a BR/EDR connection.
Read full article on Technology Lab – Ars Technica