<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secured with passkey NUS and NUS_C</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/28453/secured-with-passkey-nus-and-nus_c</link><description>Hello, 
 Is there some exemple about how to secure a NUS connection between two nRF5x (one NUS, one NUS_C) ? Dans it use a preshared passkey ? Is that secured (man in the middle, privacy, ...) ?</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Sun, 07 Jan 2018 08:45:19 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/28453/secured-with-passkey-nus-and-nus_c" /><item><title>RE: Secured with passkey NUS and NUS_C</title><link>https://devzone.nordicsemi.com/thread/112413?ContentTypeID=1</link><pubDate>Sun, 07 Jan 2018 08:45:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3fcdfc43-763e-424d-833b-260811e92021</guid><dc:creator>Fabien Comte</dc:creator><description>&lt;p&gt;Hello,
Thank you for your help.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Secured with passkey NUS and NUS_C</title><link>https://devzone.nordicsemi.com/thread/112412?ContentTypeID=1</link><pubDate>Mon, 28 Aug 2017 12:56:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8ec6625e-5309-4b5c-84b6-c3cc0aca4374</guid><dc:creator>run_ar</dc:creator><description>&lt;p&gt;Legacy pairing with Preshared / static passkey is not considered very secure, as it&amp;#39;s only a 6 digit key it can be easily brute forced&lt;/p&gt;
&lt;p&gt;LESC just works would probably be better, but doesn&amp;#39;t offer Authentication. IO capabilities would be an advantage, so you get authentication too.&lt;/p&gt;
&lt;p&gt;Depending on your security recuirements I would recommend looking at the ble_central_and_peripheral\experimental\ble_app_multirole_lesc example.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>