Intercepting Bluetooth LE communication with an app on the same mobile device
I’m thinking about man-in-the-middle attacks on a BLE connection … normally when people talk about MITM attacks it’s a separate device that sits between the mobile phone/tablet and the BLE device, which immediately limits its effectivene…