Open mrRo8o7 opened 5 months ago
If someone intercepts the Bluetooth communication, they can intercept my private Bluetooth MAC and thus also track my phone. Is my assumption correct? How do you assess the risk?
If someone intercepts the Bluetooth communication, they can intercept my private Bluetooth MAC and thus also track my phone. Is my assumption correct? How do you assess the risk?