Bluetooth vulnerability assessment is still in the dark ages. We still don’t have a good handle on all the devices that are …
If one wants to know (for attack or defense) whether a Bluetooth (BT) device is vulnerable to unauthenticated remote over-the-air …