141 Followers
75 Following
36 Posts
Alles normal. Es gibt nichts zu sehen, alles nur unsicher in der Health IT https://www.heise.de/news/BSI-Studien-zeigen-lueckenhafte-IT-Sicherheit-im-Gesundheitswesen-11214606.html
BSI-Bericht zeigt Schwächen in Praxis- und Kliniksoftware

Studien des BSI decken erhebliche Sicherheitsmängel in Praxis-, Klinik- und Pflegesoftware auf. Patientendaten sind unzureichend geschützt.

heise online

We found an interesting Bluetooth Chip in an IoT device. The IoT device is as secure as expected. Root RCE via Bluetooth and a weird HTTP debug shell. However, the Barrot Bluetooth chip is the interesting part here. It's basically a Bluetooth to UART adapter. That sounds very convenient, but holds the potential for lots of security problems.

https://insinuator.net/2026/03/hacking-a-bluetooth-printer-server-gatt-to-uart-adapter/

Hacking a Bluetooth Printer Server: GATT to UART Adapter? – Insinuator.net

All hands on keyboard, pen to paper - Elbsides 2026 Call for Paper is open!!!

Make good on your New Year resolution to contribute to the infosec community and present on June 5th in Hamburg. #elbsides2026

https://www.elbsides.eu/2026/cfp/

#elbsides2026 #CFPisopen #startwriting #infosec

#39c3 was really great this year. Met many cool people and nearly lost my voice from all the talking. Taking only positive memories home with me this year.
Except: I think I will never get over the fact that I forgot to turn off night-shift during our talk. It totally butchered our carefully crafted slides.

RE: https://infosec.exchange/@twillnix/115797806763505506

That was fun! Really happy that all demos worked like a charm.
Also, thanks to the person that tried to manipulate our live demo by calling our target phone... Luckily we had a video prepared to bridge that part.

The recording of the talk @ttdennis and I gave at #39c3 yesterday, is already online: https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone
Bluetooth Headphone Jacking: A Key to Your Phone

media.ccc.de

Join me and @willnix tomorrow at #39c3 talking about Bluetooth headphone hacking and what consequences that might have. We will finally be able to disclose all technical details. We also have a few very cool live demos prepared to demonstrate the issue. Very excited to do the talk and to be back at CCC!

https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/bluetooth-headphone-jacking-a-key-to-your-phone

[39c3] Bluetooth Headphone Jacking: A Key to Your Phone

[Airoha](https://www.airoha.com/) is a vendor that, amongst other things, builds Bluetooth SoCs and offers reference designs and implementations incorporating these chips. They have become a large supplier in the Bluetooth audio space, especially ...

39c3
If there’s a valid reason to do this I’d be happy to hear about it (and would argue that it should be in the spec). So if anyone has an explanation or justification…

One of my favourite parts of the Bluetooth specification is the "hash function" ah, which is used to generate private resolvable BLE addresses. If you follow it through its definitions (ah -> e), you'll find out that it's actually just AES.

In any exam or seminar at university you'd fail if you used AES as hash function. But, sure, for Bluetooth it's fine.

In this case it's not really an issue, but why call it a hash function if it's not a hash function?

What a nice message to wake up to!