Hello,
We avoid MITM attacks by using a static passkey. Does it mean that the attacker can decrypt the connection if attacker get the passkey? What I transfer or receive data will be captured by the attacker?
Hello,
We avoid MITM attacks by using a static passkey. Does it mean that the attacker can decrypt the connection if attacker get the passkey? What I transfer or receive data will be captured by the attacker?
It depends.
If you use the passkey to identify the device the attacker can pretend to be a trusted device, while it is not.
If not, the attacker can only decrypt an encrypted link if he has the passkey and sniffs the pairing process, only then will he get the keys used to actually encrypt the link.
That seems to be the intention, but it's not something I know much about yet. Since NFC has a very small range, it seems like it would limit key interception partly by limiting range of transmission. So, my questions are: 1) Is sniffing of NFC possible (even if not usually practical) to retrieve the OOB key? and 2) Which devices (Android, iOS, Windows Phone, etc.) currently support NFC for OOB? (I think the demos I've seen used Android devices)
That seems to be the intention, but it's not something I know much about yet. Since NFC has a very small range, it seems like it would limit key interception partly by limiting range of transmission. So, my questions are: 1) Is sniffing of NFC possible (even if not usually practical) to retrieve the OOB key? and 2) Which devices (Android, iOS, Windows Phone, etc.) currently support NFC for OOB? (I think the demos I've seen used Android devices)