effected platforms
>ios (patched in IOS10)
>android(marshmallow/nougat patched on sept9th update)
>Windows*(expect updates?)
>Linux; spying only (root exploit patched <kernel 3.11)
>BlueZ was patched for spying this week.
BlueBorne Is actually 4 exploits in one.
1. spying: passively pickup bluetooth without end user pairing/accepting a request
2. pushing requests to fish for identification or other information which can be used to unlock security questions
3. using the preview type of exploits it gains information to setup a mitm via your MACaddress which has a table for Operating Systems and chooses the exploit method which doesnt require pairing or any end user actions
4.network tether with bluetooth and allow it to attack the memory surface which leads to root privs and its also able to setup a local network to mitm you wifi-traffic and full control over the radio bands
PCucks will never EVER get bloodborne
>>62396098
THIS
>>62396098
>never ever get an exploit
Fixed in OpenBSD since 2014.
>by removing bluetooth completely