Hello,
We avoid MITM attacks by using a static passkey. Does it mean that the attacker can decrypt the connection if attacker get the passkey? What I transfer or receive data will be captured by the attacker?
Hello,
We avoid MITM attacks by using a static passkey. Does it mean that the attacker can decrypt the connection if attacker get the passkey? What I transfer or receive data will be captured by the attacker?
It depends.
If you use the passkey to identify the device the attacker can pretend to be a trusted device, while it is not.
If not, the attacker can only decrypt an encrypted link if he has the passkey and sniffs the pairing process, only then will he get the keys used to actually encrypt the link.
It seems that using static passkey is not a save way, isn't it? If we want to do some BLE application in high security way, what can we do? Using OOB only or any other methods?
It seems that using static passkey is not a save way, isn't it? If we want to do some BLE application in high security way, what can we do? Using OOB only or any other methods?