Bluetooth security (2024)

Apple Platform Security

Bluetooth security (1)

There are two types of Bluetooth in Apple devices, Bluetooth Classic and Bluetooth Low Energy (BLE). The Bluetooth security model for both versions includes the following distinct security features:

  • Pairing: The process for creating one or more shared secret keys

  • Bonding: The act of storing the keys created during pairing for use in subsequent connections to form a trusted device pair

  • Authentication: Verifying that the two devices have the same keys

  • Encryption: Message confidentiality

  • Message integrity: Protection against message forgeries

  • Secure Simple Pairing: Protection against passive eavesdropping and protection against man-in-the-middle attacks

Bluetooth version 4.1 added the Secure Connections feature to Bluetooth Classic (BR/EDR) physical transport.

The security features for each type of Bluetooth are listed below.

Support

Bluetooth Classic

Bluetooth Low Energy

Pairing

P-256 elliptic curve

FIPS-approved algorithms (AES-CMAC and P-256 elliptic curve)

Bonding

Pairing information stored in a secure location in iOS, iPadOS, macOS, tvOS, and watchOS devices

Pairing information stored in a secure location in iOS, iPadOS, macOS, tvOS, and watchOS devices

Authentication

FIPS-approved algorithms (HMAC-SHA256 and AES-CTR)

FIPS-approved algorithms

Encryption

AES-CCM cryptography, performed in the Controller

AES-CCM cryptography, performed in the Controller

Message integrity

AES-CCM, used for message integrity

AES-CCM, used for message integrity

Secure Simple Pairing: Protection against passive eavesdropping

Elliptic Curve Diffie-Hellman Exchange Ephemeral (ECDHE)

Elliptic Curve Diffie-Hellman Exchange (ECDHE)

Secure Simple Pairing: Protection against man-in-the-middle (MITM) attacks

Two user-assisted numeric methods: numerical comparison or passkey entry

Two user-assisted numeric methods: numerical comparison or passkey entry

Pairings require a user response, including all non-MITM pairing modes

Bluetooth 4.1 or later

iMac Late 2015 or later

MacBook Pro Early 2015 or later

iOS 9 or later

iPadOS 13.1 or later

macOS 10.12 or later

tvOS 9 or later

watchOS 2.0 or later

Bluetooth 4.2 or later

iPhone 6 or later

iOS 9 or later

iPadOS 13.1 or later

macOS 10.12 or later

tvOS 9 or later

watchOS 2.0 or later

Bluetooth Low Energy privacy

To help secure user privacy, BLE includes the following two features: address randomization and cross-transport key derivation.

Address randomization is a feature that reduces the ability to track a BLE device over a period of time by changing the Bluetooth device address on a frequent basis. For a device using the privacy feature to reconnect to known devices, the device address, referred to as the private address, must be resolvable by the other device. The private address is generated using the device’s identity resolving key exchanged during the pairing procedure.

iOS 13 or later and iPadOS 13.1 or later have the ability to derive link keys across transports, a feature known as cross-transport key derivation. For example, a link key generated with BLE can be used to derive a Bluetooth Classic link key. In addition, Apple added Bluetooth Classic to BLE support for devices that support the Secured Connections feature that was introduced in the Bluetooth Core Specification 4.1 (see the Bluetooth Core Specification 5.1).

Helpful?

Thanks for your feedback.

Bluetooth security (2024)

FAQs

How secure is Bluetooth? ›

A Bluetooth connection is less secure than a private Wi-Fi connection. It can be a vulnerable point of access for data or identity theft. So, avoid sharing sensitive information and documents over Bluetooth. If you must share sensitive information, use a secure file sharing tool like WeTransfer.

Can someone connect to my Bluetooth without me knowing? ›

Modern Bluetooth devices generally require some kind of pairing sequence before they begin communicating with each other. This makes it difficult for someone with a Bluetooth device to connect to your device(s) without permission.

How do I create a Bluetooth security? ›

5 Ways To Create A Safer Bluetooth Connection
  1. Make sure that your devices use a recent Bluetooth version. ...
  2. Avoid using Just Work paring when possible. ...
  3. Make sure you are using BLE link-layer encryption. ...
  4. Use application-level encryption. ...
  5. Use Additional Bluetooth-independent re-authentication. ...
  6. Conclusion.
Jun 12, 2023

Is it safe to have Bluetooth on all the time? ›

Turn Bluetooth off when not in use. Keeping it active enables hackers to discover what other devices you connected to before, spoof one of those devices, and gain access to your device. If you connect your mobile phone to a rental car, the phone's data may get shared with the car.

Should you keep Bluetooth on or off? ›

While Bluetooth is beneficial for many applications, be careful how you use it. My advice: Turn off Bluetooth when you're not using it. Keeping it active all the time makes your device more discoverable. As a bonus, keeping Bluetooth off will increase your device's battery life.

Which is safer Bluetooth or Wi-Fi? ›

Bluetooth provides sufficient security for most purposes, although it is not intended as a fully secure protocol. However, using WiFi can help if you're concerned about sensitive data transmission.

Does Bluetooth have built in encryption? ›

Bluetooth encrypts its data transmissions with a stream cipher called E0. The key stream used is generated through an algorithm that takes the following values as input: the device address, a random number, a slot number, and an encryption key.

What is more secure than Bluetooth? ›

2 WiFi Protocols

It operates over greater distances than Bluetooth and supports more data throughput. WiFi security relies heavily on protocols like WPA2 (WiFi Protected Access 2) and the newer WPA3, which encrypt data to protect against eavesdropping and ensure that only authorized users can access the network.

Is Bluetooth safe cybersecurity? ›

Everyone should practice basic cybersecurity hygiene when using Bluetooth and remember that a hack of your data, including work information, is very real if rogue connections are made and personal data allowed to be synchronized with your Bluetooth device. Always trust but verify all of your Bluetooth connections.

What are three disadvantages of Bluetooth? ›

Bluetooth Issues
  • Bluetooth interference - Since Bluetooth is a wireless technology, it is susceptible to interference from other devices. One way to mitigate this is to use Bluetooth repeaters to increase the range of your Bluetooth devices.
  • Bluetooth's short lifespan - Bluetooth devices have a short lifespan.

What precautions should be taken when using Bluetooth? ›

Always ensure you are in a secure and safe location such as home, office, or a known isolated place before switching on your Bluetooth. If someone can find what Bluetooth devices you have, or are using, they might try and use one of their device to intercept or monitor the connection.

How to prevent someone from connecting to your Bluetooth? ›

Use Bluetooth in "hidden" mode - When you do have Bluetooth enabled, make sure it is "hidden," not "discoverable." The hidden mode prevents other Bluetooth devices from recognizing your device.

Is Bluetooth safer than cell phone? ›

In addition, Bluetooth headsets emit much less radiation than cell phones, which is another reason why they are generally considered safe for use while driving. However, it is still important to follow local laws and regulations regarding cell phone and Bluetooth headsets use while driving.

Can someone else turn on my Bluetooth? ›

Yes, Bluetooth can be hacked. Hackers rely on proximity to establish a remote connection on your device to install malware and other malicious software to gain access to your personal information. Hackers use a few different types of Bluetooth-hacking methods, but there are ways you can protect yourself.

Top Articles
Robinhood vs. Coinbase 2024: Which Investing App is Right for You?
The 3 Rules to Paying Off Debt Fast
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6476

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.