Pairing is an important concept in Bluetooth LE. Let’s examine the fundamentals of Bluetooth LE pairing, outlining how LE devices securely share keys between trusted devices.
September 10, 2023 by Nthatisi Hlapisi
Learn the roles of the three security keys in Bluetooth LE—Long Term Key (LTK), Connection Signature Resolving Key (CSRK), and Identity Resolving Key (IRK).
August 13, 2023 by Nthatisi Hlapisi
Electromagnetic-based side-channel attacks are non-invasive, meaning the attacker does not need physical access to the device to steal information. We’ll look at how these EM side-channel attacks work.
July 26, 2023 by Jake Hertz
To understand known vulnerabilities and attacks on Bluetooth LE devices, we review some studies from the past 4+ years.
July 16, 2023 by Nthatisi Hlapisi
Part two of building a device that can detect Wi-Fi signals and "react" accordingly.
July 26, 2017 by Jeremy Lee
The intuitive, step-by-step procedure presented in this article will help you to successfully perform reflow soldering in your toaster oven.
December 18, 2015 by Robert Keim
You can buy cheap 433MHz RF modules from Mouser and DigiKey. This article will show you how to use them with a PICAXE microcontroller to hack your own mousetraps.
October 07, 2015 by Jens Christoffersen
Don't have an AAC account? Create one now.
Forgot your password? Click here.