Talk:Bluetooth Special Interest Group

Fair use rationale for Image:Bluetooth-logo.svg
Image:Bluetooth-logo.svg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot (talk) 04:08, 12 February 2008 (UTC)

Promoter members list
I revised the "promoter members" list, and took out:


 * IBM (founder member)
 * Apple Inc (since 2011)
 * Nordic Semiconductor (since 2011)

because they aren't. Possibly Lenovo now have IBM's slot? If so, that might be noted. Dunno why Apple or Nordic were on the list William M. Connolley (talk) 11:24, 20 December 2012 (UTC)

Blueborne attack
I'm thinking this group would be interested in this, but I don't know where to put it?

According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.

Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects. Researchers from Armis Labs who found the exploit were able to use it to create botnets and install ransomware.

Armis video: "Blueborne explained" Sept 12/17

Armis article: A new Bluetooth exploit leaves billions of devices vulnerable

Raymm (talk) 01:00, 13 September 2017 (UTC)

Okay
747,152,525,252,522,252,852,252,252 43.231.29.166 (talk) 21:54, 5 April 2022 (UTC)