Security & Privacy
BLE security mechanisms, privacy features, and vulnerability mitigation
5
5 guides in this series
1
2
3
4
5
BLE Privacy Features: Address Randomization and IRK
Understanding resolvable private addresses and privacy modes
4 min read
Secure BLE DFU: Signed Firmware Updates Over-the-Air
Implementing cryptographically signed OTA updates
4 min read
BLE Vulnerabilities: Known Attacks and Mitigations
SweynTooth, KNOB, BLESA, and other BLE security issues
4 min read
BLE Pairing Methods Compared: Just Works vs Passkey vs OOB
Choosing the right pairing method for your security requirements
5 min read
BLE MITM Prevention: Securing Against Man-in-the-Middle Attacks
Protecting BLE connections from eavesdropping and relay attacks
4 min read