Black Hills Information Security, Inc.
Machine-in-the-Middle (MitM) BLE Attack - Black Hills Information Security, Inc.
Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my f...