BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys

Do góry