Difference between revisions of "PineTime Bluetooth"
Jump to navigation
Jump to search
(Created page with " This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it == External references == * Uncovering Privacy Leakage in...") |
|||
Line 4: | Line 4: | ||
== External references == | == External references == | ||
* Uncovering Privacy Leakage in BLE Network Traffic of | * Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf | ||
Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf | |||
* Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf | * Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf |
Revision as of 15:42, 16 September 2020
This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it
External references
- Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf
- Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf