Is Your Bluetooth Chip Leaking Secrets via RF Signals? (semanticscholar.org)

122 points by transpute 18 hours ago

ryukoposting 13 hours ago

As someone who finally recently escaped bluetooth firmware development: yes, Bluetooth is leaking secrets and it doesn't even require any silly RF shenanigans. Almost nothing actually implements LESC. Apple refuses to implement OOB pairing, so no peripherals can force you to use it, so everything is subject to MITM attacks. The entire ecosystem is a mess of consultants and underpaid devs copy-pasting Nordic sample code, with no time or financial incentive to do more than the bare minumum. Never trust any product that moves sensitive data through Bluetooth.

9029 3 hours ago

Do you have an opinion on the keyboard firmware ZMK? They seem to use LESC but MITM during pairing is still a concern: https://zmk.dev/docs/features/bluetooth

matthewdgreen 12 hours ago

Apple claims to have implemented an entire second security level for their Bluetooth apps based on iMessage, but I trust it not at all.

(To be clear, I trust the iMessage protocol with reasonable confidence. I judge the probability that Apple has applied this extra layer of security uniformly to all sensitive data to be about 8%.)

ggm 8 hours ago

8.75% surely? you need at least two digits of specious precision on that non-random number.

cozzyd 10 hours ago

Text written with a non-apple Bluetooth keyboard is green?

hulitu 5 hours ago

> Apple claims to have implemented an entire second security level for their Bluetooth apps based on iMessage,

iMessage... the golden standard for 1click RCE. /s

SXX 9 hours ago

Just curious if it that insecure how does Magic Keyboard with Touch ID works? Does it use some apple proprietary "magic"?

makeitdouble 9 hours ago

> "magic"

They're on an proprietary extension of Bluetooth, standard compatible but closed to their devices. They usually don't talk much about it, Phil Schiller was the most explicit I think (it was about the airpod's W1 but it's the same deal)

https://www.theverge.com/2016/9/7/12829190/apple-w1-chip-iph...

> Apple’s Phil Schiller described Apple’s move to a new wireless chip as “fixing the challenges” of wireless audio

voidUpdate 2 hours ago

I really think we need a modern replacement to bluetooth, something that doesn't have weird behaviour with headphones, is more secure and doesn't have weird connection issues all the time, and is as ubiquitous as bluetooth is now. I know it will never happen, but I can only hope

Verdex 12 hours ago

Time for everyone to implement some variation of https://www.bluetooth.com/specifications/specs/authorization... ?

3abiton 15 hours ago

I read the abstract, while not familiar with the topic, how would we go about limiting the inpact?

Retr0id 13 hours ago

Rotating keys frequently would probably help. But the best thing to do is use implementations that are less leaky in the first place (which is easier said than done).

vardump 16 hours ago

A side channel attack revealing AES key from just 90,000 traces.

Sigh, side channel attacks seem to be everywhere now.

barbegal 15 hours ago

That 90,000 traces did take 225 hours to capture so it is truly a huge amount of data and not a trivial attack.

karlgkk 15 hours ago

On the other hand, I’d argue that it’s close enough to trivial to be considered trivial. How many embedded devices transmit sensitive information?

Now, I know that pretty much every Bluetooth based credit card reading device explicitly defends against a channel such as this, but there are tons of access control solutions, and medical devices that don’t

Would you notice a raspberry pi tucked into the mess of wires beneath the security guard guards desk?

throwaway89201 14 hours ago

kragen 8 hours ago

That's less than two weeks.

userbinator 6 hours ago

sitzkrieg 16 hours ago

people are finally aware everything leaks, it's just a matter of how closely you look

boulevard 16 hours ago

Everything leaks if you stare at it long enough

czbond 15 hours ago

formerly_proven 15 hours ago