Bluetooth security (2024)

Apple Platform Security

Bluetooth security (1)

There are two types of Bluetooth in Apple devices, Bluetooth Classic and Bluetooth Low Energy (BLE). The Bluetooth security model for both versions includes the following distinct security features:

  • Pairing: The process for creating one or more shared secret keys

  • Bonding: The act of storing the keys created during pairing for use in subsequent connections to form a trusted device pair

  • Authentication: Verifying that the two devices have the same keys

  • Encryption: Message confidentiality

  • Message integrity: Protection against message forgeries

  • Secure Simple Pairing: Protection against passive eavesdropping and protection against man-in-the-middle attacks

Bluetooth version 4.1 added the Secure Connections feature to Bluetooth Classic (BR/EDR) physical transport.

The security features for each type of Bluetooth are listed below.

Support

Bluetooth Classic

Bluetooth Low Energy

Pairing

P-256 elliptic curve

FIPS-approved algorithms (AES-CMAC and P-256 elliptic curve)

Bonding

Pairing information stored in a secure location in iOS, iPadOS, macOS, tvOS, and watchOS devices

Pairing information stored in a secure location in iOS, iPadOS, macOS, tvOS, and watchOS devices

Authentication

FIPS-approved algorithms (HMAC-SHA256 and AES-CTR)

FIPS-approved algorithms

Encryption

AES-CCM cryptography, performed in the Controller

AES-CCM cryptography, performed in the Controller

Message integrity

AES-CCM, used for message integrity

AES-CCM, used for message integrity

Secure Simple Pairing: Protection against passive eavesdropping

Elliptic Curve Diffie-Hellman Exchange Ephemeral (ECDHE)

Elliptic Curve Diffie-Hellman Exchange (ECDHE)

Secure Simple Pairing: Protection against man-in-the-middle (MITM) attacks

Two user-assisted numeric methods: numerical comparison or passkey entry

Two user-assisted numeric methods: numerical comparison or passkey entry

Pairings require a user response, including all non-MITM pairing modes

Bluetooth 4.1 or later

iMac Late 2015 or later

MacBook Pro Early 2015 or later

iOS 9 or later

iPadOS 13.1 or later

macOS 10.12 or later

tvOS 9 or later

watchOS 2.0 or later

Bluetooth 4.2 or later

iPhone 6 or later

iOS 9 or later

iPadOS 13.1 or later

macOS 10.12 or later

tvOS 9 or later

watchOS 2.0 or later

Bluetooth Low Energy privacy

To help secure user privacy, BLE includes the following two features: address randomization and cross-transport key derivation.

Address randomization is a feature that reduces the ability to track a BLE device over a period of time by changing the Bluetooth device address on a frequent basis. For a device using the privacy feature to reconnect to known devices, the device address, referred to as the private address, must be resolvable by the other device. The private address is generated using the device’s identity resolving key exchanged during the pairing procedure.

iOS 13 or later and iPadOS 13.1 or later have the ability to derive link keys across transports, a feature known as cross-transport key derivation. For example, a link key generated with BLE can be used to derive a Bluetooth Classic link key. In addition, Apple added Bluetooth Classic to BLE support for devices that support the Secured Connections feature that was introduced in the Bluetooth Core Specification 4.1 (see the Bluetooth Core Specification 5.1).

Helpful?

Thanks for your feedback.

Bluetooth security (2024)

FAQs

How secure is Bluetooth? ›

A Bluetooth connection is less secure than a private Wi-Fi connection. It can be a vulnerable point of access for data or identity theft. So, avoid sharing sensitive information and documents over Bluetooth. If you must share sensitive information, use a secure file sharing tool like WeTransfer.

Can someone connect to my Bluetooth without me knowing? ›

Modern Bluetooth devices generally require some kind of pairing sequence before they begin communicating with each other. This makes it difficult for someone with a Bluetooth device to connect to your device(s) without permission.

How do I create a Bluetooth security? ›

5 Ways To Create A Safer Bluetooth Connection
  1. Make sure that your devices use a recent Bluetooth version. ...
  2. Avoid using Just Work paring when possible. ...
  3. Make sure you are using BLE link-layer encryption. ...
  4. Use application-level encryption. ...
  5. Use Additional Bluetooth-independent re-authentication. ...
  6. Conclusion.
Jun 12, 2023

Is it safe to have Bluetooth on all the time? ›

Turn Bluetooth off when not in use. Keeping it active enables hackers to discover what other devices you connected to before, spoof one of those devices, and gain access to your device. If you connect your mobile phone to a rental car, the phone's data may get shared with the car.

Should you keep Bluetooth on or off? ›

While Bluetooth is beneficial for many applications, be careful how you use it. My advice: Turn off Bluetooth when you're not using it. Keeping it active all the time makes your device more discoverable. As a bonus, keeping Bluetooth off will increase your device's battery life.

Which is safer Bluetooth or Wi-Fi? ›

Bluetooth provides sufficient security for most purposes, although it is not intended as a fully secure protocol. However, using WiFi can help if you're concerned about sensitive data transmission.

Does Bluetooth have built in encryption? ›

Bluetooth encrypts its data transmissions with a stream cipher called E0. The key stream used is generated through an algorithm that takes the following values as input: the device address, a random number, a slot number, and an encryption key.

What is more secure than Bluetooth? ›

2 WiFi Protocols

It operates over greater distances than Bluetooth and supports more data throughput. WiFi security relies heavily on protocols like WPA2 (WiFi Protected Access 2) and the newer WPA3, which encrypt data to protect against eavesdropping and ensure that only authorized users can access the network.

Is Bluetooth safe cybersecurity? ›

Everyone should practice basic cybersecurity hygiene when using Bluetooth and remember that a hack of your data, including work information, is very real if rogue connections are made and personal data allowed to be synchronized with your Bluetooth device. Always trust but verify all of your Bluetooth connections.

What are three disadvantages of Bluetooth? ›

Bluetooth Issues
  • Bluetooth interference - Since Bluetooth is a wireless technology, it is susceptible to interference from other devices. One way to mitigate this is to use Bluetooth repeaters to increase the range of your Bluetooth devices.
  • Bluetooth's short lifespan - Bluetooth devices have a short lifespan.

What precautions should be taken when using Bluetooth? ›

Always ensure you are in a secure and safe location such as home, office, or a known isolated place before switching on your Bluetooth. If someone can find what Bluetooth devices you have, or are using, they might try and use one of their device to intercept or monitor the connection.

How to prevent someone from connecting to your Bluetooth? ›

Use Bluetooth in "hidden" mode - When you do have Bluetooth enabled, make sure it is "hidden," not "discoverable." The hidden mode prevents other Bluetooth devices from recognizing your device.

Is Bluetooth safer than cell phone? ›

In addition, Bluetooth headsets emit much less radiation than cell phones, which is another reason why they are generally considered safe for use while driving. However, it is still important to follow local laws and regulations regarding cell phone and Bluetooth headsets use while driving.

Can someone else turn on my Bluetooth? ›

Yes, Bluetooth can be hacked. Hackers rely on proximity to establish a remote connection on your device to install malware and other malicious software to gain access to your personal information. Hackers use a few different types of Bluetooth-hacking methods, but there are ways you can protect yourself.

Top Articles
How to Start a DAO | Start Your DAO Today | ZenBusiness Inc. 
Advantages and Disadvantages of Multicore Processors - GeeksforGeeks
Fernald Gun And Knife Show
Star Wars Mongol Heleer
417-990-0201
Garrison Blacksmith Bench
Terrorist Usually Avoid Tourist Locations
Fredatmcd.read.inkling.com
Comforting Nectar Bee Swarm
Klustron 9
Bbc 5Live Schedule
Ree Marie Centerfold
Restaurants Near Paramount Theater Cedar Rapids
Top tips for getting around Buenos Aires
Viprow Golf
Leader Times Obituaries Liberal Ks
Dtab Customs
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Ups Access Point Lockers
Plan Z - Nazi Shipbuilding Plans
Bank Of America Financial Center Irvington Photos
Ally Joann
Amazing deals for DKoldies on Goodshop!
Nz Herald Obituary Notices
Wemod Vampire Survivors
Tire Plus Hunters Creek
CVS Health’s MinuteClinic Introduces New Virtual Care Offering
Star Wars Armada Wikia
Goodwill Of Central Iowa Outlet Des Moines Photos
Ardie From Something Was Wrong Podcast
Mjc Financial Aid Phone Number
Guide to Cost-Benefit Analysis of Investment Projects Economic appraisal tool for Cohesion Policy 2014-2020
Devotion Showtimes Near The Grand 16 - Pier Park
Dtlr On 87Th Cottage Grove
Google Jobs Denver
The Complete Guide To The Infamous "imskirby Incident"
Sept Month Weather
How Does The Common App Work? A Guide To The Common App
Ds Cuts Saugus
Pulaski County Ky Mugshots Busted Newspaper
Yourcuteelena
Hampton In And Suites Near Me
Lawrence E. Moon Funeral Home | Flint, Michigan
Victoria Vesce Playboy
City Of Irving Tx Jail In-Custody List
FactoryEye | Enabling data-driven smart manufacturing
Dietary Extras Given Crossword Clue
18 Seriously Good Camping Meals (healthy, easy, minimal prep! )
Assignation en paiement ou injonction de payer ?
Intuitive Astrology with Molly McCord
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6476

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.